Warnings in 26 pages

Baudry)

replace 'Baudry)' by '(Badry)'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • (Badry)

Fitzgerald,);

replace 'Fitzgerald,);' by 'Fitzgerald,'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • Fitzgerald,

-Getstera-Arteaga);

delete '-Getstera-Arteaga);' by ''

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

eeUh

replace 'eeUh' by 'Getstera-Arteaga);'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • Getstera-Arteaga);

[tHuysknatiseeas

replace '[tHuysknatiseeas' by '-'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • -

authors

replace 'authors' by 'eeUh'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • eeUh

“Corresponding

replace '“Corresponding' by '[tHuysknatiseeas'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • [tHuysknatiseeas

replacements.

replace 'replacements.' by 'authors'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • authors

code

replace 'code' by '“Corresponding'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • “Corresponding

equivalent

replace 'equivalent' by 'replacements.'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • replacements.

functionally

replace 'functionally' by 'code'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • code

with

replace 'with' by 'equivalent'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • equivalent

binary

replace 'binary' by 'functionally'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • functionally

WebAssembly

replace 'WebAssembly' by 'with'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • with

transforming

replace 'transforming' by 'binary'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • binary

through

replace 'through' by 'WebAssembly'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • WebAssembly

achieved

replace 'achieved' by 'transforming'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • transforming

[20],

replace '[20],' by 'through'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • through

2021

replace '2021' by 'achieved'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • achieved

in

replace 'in' by '[20],'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • [20],

Fastly

replace 'Fastly' by '2021'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • 2021

insert '' by 'Fastly'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • Fastly

insert '' by 'in'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • in

opti-mization

replace 'opti-mization' by 'optimization'

Happy suggestion

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)

(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)

Suggestions

  • optimization

Unpaired symbol: ‘”’ seems to be missing

Happy suggestion

Software diversification is a well-known software pro-tection technique [13, 5, 21], consisting of producing numerous variants of an original program, each retaining equivalent functionality. Software diversification in Web-Assembly has several application domains, such as opti-mization [6] and malware evasion [8] research. It can also be used for fuzzing, an example of this was the discovery of a CVE in Fastly in 2021 [20], achieved through transforming WebAssembly binary with functionally equivalent code replacements. “Corresponding authors [tHuysknatiseeas eeUh -Getstera-Arteaga); nfitzgerald@fastly.com(N. Fitzgerald,); monperrus@kth.se (M. Monperrus); baudryekth.se (B. Baudry) ORCID(s): 0000-0001-9399-8647 (J. Cabrera-Arteaga); 0000-0002-0209-2805 (N. Fitzgerald,); 0000-0003-3505-3383 (M. Monperrus); 0000-0002-4015-4640 (B. Baudry)

Suggestions

insert '' by 'to'

Happy suggestion

(0)1. Introduction (1)Introduction (2)to (3)Introduction (4)to (5)Introduction (6)to (7)Introduction (8)to (9)Introduction (10)to (11)Introduction (12)to (13)Introduction (14)to (15)Introduction (16)to (17)Introduction (18)to (19)Introduction (20)to (21)Introduction (22)to (23)Introduction (24)to (25)Introduction (26)to (27)Introduction (28)to (29)Introduction (30)to (31)Introduction (32)to (33)Introduction (34)to (35)Introduction (36)to (37)Introduction (38)to (39)Introduction (40)to (41)Introduction (42)to (43)Introduction (44)to (45)Introduction (46)to (47)Introduction (48)to (49)Introduction (50)to (51)Introduction (52)to (53)Introduction (54)to (55)Introduction (56)to (57)Introduction (58)to (59)Introduction (60)to (61)Introduction (62)to (63)Introduction (64)to (65)Introduction (66)to (67)Introduction (68)to (69)Introduction (70)to (71)Introduction (72)to (73)Introduction (74)to (75)Introduction (76)to (77)Introduction (78)to (79)Introduction (80)to (81)Introduction (82)to (83)Introduction (84)to (85)Introduction (86)to (87)Introduction (88)to (89)Introduction (90)to (91)Introduction (92)to (93)Introduction (94)to (95)Introduction (96)to (97)Introduction (98)to (99)Introduction (100)to (101)Introduction (102)to (103)Introduction (104)to (105)Introduction (106)to (107)Introduction (108)to (109)Introduction (110)to (111)Introduction (112)to

(0)1. Introduction

Suggestions

  • to

insert '' by 'Introduction'

Happy suggestion

(0)1. Introduction (1)Introduction (2)to (3)Introduction (4)to (5)Introduction (6)to (7)Introduction (8)to (9)Introduction (10)to (11)Introduction (12)to (13)Introduction (14)to (15)Introduction (16)to (17)Introduction (18)to (19)Introduction (20)to (21)Introduction (22)to (23)Introduction (24)to (25)Introduction (26)to (27)Introduction (28)to (29)Introduction (30)to (31)Introduction (32)to (33)Introduction (34)to (35)Introduction (36)to (37)Introduction (38)to (39)Introduction (40)to (41)Introduction (42)to (43)Introduction (44)to (45)Introduction (46)to (47)Introduction (48)to (49)Introduction (50)to (51)Introduction (52)to (53)Introduction (54)to (55)Introduction (56)to (57)Introduction (58)to (59)Introduction (60)to (61)Introduction (62)to (63)Introduction (64)to (65)Introduction (66)to (67)Introduction (68)to (69)Introduction (70)to (71)Introduction (72)to (73)Introduction (74)to (75)Introduction (76)to (77)Introduction (78)to (79)Introduction (80)to (81)Introduction (82)to (83)Introduction (84)to (85)Introduction (86)to (87)Introduction (88)to (89)Introduction (90)to (91)Introduction (92)to (93)Introduction (94)to (95)Introduction (96)to (97)Introduction (98)to (99)Introduction (100)to (101)Introduction (102)to (103)Introduction (104)to (105)Introduction (106)to (107)Introduction (108)to (109)Introduction (110)to (111)Introduction (112)to

(0)1. Introduction

Suggestions

  • Introduction

swiftly

replace 'swiftly' by 'rapidly'

Happy suggestion

(0)ABSTRACT (1)WebAssembly (2)is (3)the (4)fourth (5)officially (6)endorsed (7)Web (8)language. It (9)is (10)recognized (11)because (12)of (13)its (14)efficiency (15)and (16)design, (17)focused (18)on (19)security. Yet, (20)its (21)rapidly (22)expanding (23)ecosystem (24)lacks (25)robust (26)software (27)diversification (28)systems. We (29)introduce (30)WASM-MUTATE, (31)a (32)diversification (33)engine (34)specifically (35)designed (36)for (37)WebAssembly. Our (38)engine (39)meets (40)several (41)essential (42)criteria: (43)1) (44)To (45)quickly (46)generate (47)functionally (48)identical, (49)yet (50)behaviorally (51)diverse, (52)WebAssembly (53)variants, (54)2) (55)To (56)be (57)universally (58)applicable (59)to (60)any (61)WebAssembly (62)program, (63)irrespective (64)of (65)the (66)source (67)programming (68)language, (69)and (70)3) (71)Generated (72)variants (73)should (74)counter (75)side-channels. By (76)leveraging (77)an (78)e-graph (79)data (80)structure, (81)WASM-MUTATE (82)is (83)implemented (84)to (85)meet (86)both (87)speed (88)and (89)efficacy. We (90)evaluate (91)WASM-MUTATE (92)by (93)conducting (94)experiments (95)on (96)404 (97)programs, (98)which (99)include (100)real-world (101)applications. Our (102)results (103)highlight (104)that (105)WASM-MUTATE (106)can (107)produce (108)tens (109)of (110)thousands (111)of (112)unique (113)and (114)efficient (115)WebAssembly (116)variants (117)within (118)minutes. Significantly, (119)WASM-MUTATE (120)can (121)safeguard (122)WebAssembly (123)binaries (124)against (125)timing (126)side-channel (127)attacks, (128)especially (129)those (130)of (131)the (132)Spectre (133)type.

(0)ABSTRACT (1)WebAssembly (2)is (3)the (4)fourth (5)officially (6)endorsed (7)Web (8)language. It (9)is (10)recognized (11)because (12)of (13)its (14)efficiency (15)and (16)design, (17)focused (18)on (19)security. Yet, (20)its (21)swiftly (22)expanding (23)ecosystem (24)lacks (25)robust (26)software (27)diversification (28)systems. We (29)introduce (30)WASM-MUTATE, (31)a (32)diversification (33)engine (34)specifically (35)designed (36)for (37)WebAssembly. Our (38)engine (39)meets (40)several (41)essential (42)criteria: (43)1) (44)To (45)quickly (46)generate (47)functionally (48)identical, (49)yet (50)behaviorally (51)diverse, (52)WebAssembly (53)variants, (54)2) (55)To (56)be (57)universally (58)applicable (59)to (60)any (61)WebAssembly (62)program, (63)irrespective (64)of (65)the (66)source (67)programming (68)language, (69)and (70)3) (71)Generated (72)variants (73)should (74)counter (75)side-channels. By (76)leveraging (77)an (78)e-graph (79)data (80)structure, (81)WASM-MUTATE (82)is (83)implemented (84)to (85)meet (86)both (87)speed (88)and (89)efficacy. We (90)evaluate (91)WASM-MUTATE (92)by (93)conducting (94)experiments (95)on (96)404 (97)programs, (98)which (99)include (100)real-world (101)applications. Our (102)results (103)highlight (104)that (105)WASM-MUTATE (106)can (107)produce (108)tens (109)of (110)thousands (111)of (112)unique (113)and (114)efficient (115)WebAssembly (116)variants (117)within (118)minutes. Significantly, (119)WASM-MUTATE (120)can (121)safeguard (122)WebAssembly (123)binaries (124)against (125)timing (126)side-channel (127)attacks, (128)especially (129)those (130)of (131)the (132)Spectre (133)type.

Suggestions

  • rapidly

USA

replace 'USA' by 'USA.'

Happy suggestion

(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)» (8)Fastly (9)Inc., (10)San (11)Francisco, (12)USA.

(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)»Fastly (8)Inc., (9)San (10)Francisco, (11)USA

Suggestions

  • USA.

insert '' by 'Fastly'

Happy suggestion

(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)» (8)Fastly (9)Inc., (10)San (11)Francisco, (12)USA.

(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)»Fastly (8)Inc., (9)San (10)Francisco, (11)USA

Suggestions

  • Fastly

»Fastly

replace '»Fastly' by '»'

Happy suggestion

(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)» (8)Fastly (9)Inc., (10)San (11)Francisco, (12)USA.

(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)»Fastly (8)Inc., (9)San (10)Francisco, (11)USA

Suggestions

  • »

,?

Put a space after the comma.

Happy suggestion

Javier Cabrera-Arteaga**, Nicholas Fitzgerald,?, Martin Monperrus“ and Benoit Baudry“

Suggestions

  • , ?

WebAssembly

replace 'WebAssembly' by 'WebAssembly.'

Happy suggestion

(0)WebAssembly.

(0)WebAssembly

Suggestions

  • WebAssembly.

for

delete 'for' by ''

Happy suggestion

(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for (7)Binary (8)Diversification.

(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for

Suggestions

Diversification

replace 'Diversification' by 'Diversification.'

Happy suggestion

(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for (7)Binary (8)Diversification.

(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for

Suggestions

  • Diversification.

insert '' by 'for'

Happy suggestion

(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for (7)Binary (8)Diversification.

(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for

Suggestions

  • for

insert '' by 'Diversification'

Happy suggestion

(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for (7)Binary (8)Diversification.

(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for

Suggestions

  • Diversification

insert '' by 'Binary'

Happy suggestion

(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for (7)Binary (8)Diversification.

(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for

Suggestions

  • Binary

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)| (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)| (5)of (6)25

Suggestions

  • 25.

arr

delete 'arr' by ''

Happy suggestion

(0)fn (1)main() (2) (3)let (4)mutarr (5)= (6)[1, (7)2, (8)3, (9)4, (10)5];

(0)fn (1)main() (2){ (3)let (4)mut (5)arr (6)= (7)[1, (8)2, (9)3, (10)4, (11)5];

Suggestions

mut

delete 'mut' by ''

Happy suggestion

(0)fn (1)main() (2) (3)let (4)mutarr (5)= (6)[1, (7)2, (8)3, (9)4, (10)5];

(0)fn (1)main() (2){ (3)let (4)mut (5)arr (6)= (7)[1, (8)2, (9)3, (10)4, (11)5];

Suggestions

let

replace 'let' by 'mutarr'

Happy suggestion

(0)fn (1)main() (2) (3)let (4)mutarr (5)= (6)[1, (7)2, (8)3, (9)4, (10)5];

(0)fn (1)main() (2){ (3)let (4)mut (5)arr (6)= (7)[1, (8)2, (9)3, (10)4, (11)5];

Suggestions

  • mutarr

{

replace '{' by 'let'

Happy suggestion

(0)fn (1)main() (2) (3)let (4)mutarr (5)= (6)[1, (7)2, (8)3, (9)4, (10)5];

(0)fn (1)main() (2){ (3)let (4)mut (5)arr (6)= (7)[1, (8)2, (9)3, (10)4, (11)5];

Suggestions

  • let

to

replace 'to' by 'To'

Happy suggestion

(0)At (1)runtime, (2)WebAssembly (3)programs (4)operate (5)on (6)a (7)virtual (8)stack (9)that (10)holds (11)primitive (12)data (13)types. Such (14)data (15)is (16)then (17)operated (18)by (19)typed (20)stack (21)instructions. A (22)WebAssembly (23)program (24)also (25)declares (26)linear (27)memory (28)and (29)globals, (30)which (31)are (32)used (33)to (34)store, (35)manipulate, (36)and (37)share (38)data (39)during (40)program (41)execution, (42)e.g. To (43)share (44)data (45)with (46)the (47)host (48)engine (49)of (50)the (51)WebAssembly (52)binary. In (53)Listing (54)1, (55)we (56)provide (57)an (58)example (59)of (60)a (61)Rust (62)program (63)that (64)contains (65)a (66)function (67)declaration, (68)a (69)loop, (70)a (71)loop (72)conditional, (73)and (74)a (75)memory (76)access. When (77)the (78)Rust (79)code (80)is (81)compiled (82)to (83)WebAssembly, (84)it (85)produces (86)the (87)code (88)shown (89)in (90)Listing (91)2.

(0)Atruntime, (1)WebAssembly (2)programs (3)operate (4)on (5)a (6)virtual (7)stack (8)that (9)holds (10)primitive (11)data (12)types. Such (13)data (14)is (15)then (16)operated (17)by (18)typed (19)stack (20)instructions. A (21)WebAssembly (22)program (23)also (24)declares (25)linear (26)memory (27)and (28)globals, (29)which (30)are (31)used (32)to (33)store, (34)manipulate, (35)and (36)share (37)data (38)during (39)program (40)execution, (41)e.g. to (42)share (43)data (44)with (45)the (46)host (47)engine (48)of (49)the (50)WebAssembly (51)binary. In (52)Listing (53)1, (54)we (55)provide (56)an (57)example (58)of (59)a (60)Rust (61)program (62)that (63)contains (64)a (65)function (66)declaration, (67)a (68)loop, (69)a (70)loop (71)conditional, (72)and (73)a (74)memory (75)access. When (76)the (77)Rust (78)code (79)is (80)compiled (81)to (82)WebAssembly, (83)it (84)produces (85)the (86)code (87)shown (88)in (89)Listing (90)2.

Suggestions

  • To

insert '' by 'runtime,'

Happy suggestion

(0)At (1)runtime, (2)WebAssembly (3)programs (4)operate (5)on (6)a (7)virtual (8)stack (9)that (10)holds (11)primitive (12)data (13)types. Such (14)data (15)is (16)then (17)operated (18)by (19)typed (20)stack (21)instructions. A (22)WebAssembly (23)program (24)also (25)declares (26)linear (27)memory (28)and (29)globals, (30)which (31)are (32)used (33)to (34)store, (35)manipulate, (36)and (37)share (38)data (39)during (40)program (41)execution, (42)e.g. To (43)share (44)data (45)with (46)the (47)host (48)engine (49)of (50)the (51)WebAssembly (52)binary. In (53)Listing (54)1, (55)we (56)provide (57)an (58)example (59)of (60)a (61)Rust (62)program (63)that (64)contains (65)a (66)function (67)declaration, (68)a (69)loop, (70)a (71)loop (72)conditional, (73)and (74)a (75)memory (76)access. When (77)the (78)Rust (79)code (80)is (81)compiled (82)to (83)WebAssembly, (84)it (85)produces (86)the (87)code (88)shown (89)in (90)Listing (91)2.

(0)Atruntime, (1)WebAssembly (2)programs (3)operate (4)on (5)a (6)virtual (7)stack (8)that (9)holds (10)primitive (11)data (12)types. Such (13)data (14)is (15)then (16)operated (17)by (18)typed (19)stack (20)instructions. A (21)WebAssembly (22)program (23)also (24)declares (25)linear (26)memory (27)and (28)globals, (29)which (30)are (31)used (32)to (33)store, (34)manipulate, (35)and (36)share (37)data (38)during (39)program (40)execution, (41)e.g. to (42)share (43)data (44)with (45)the (46)host (47)engine (48)of (49)the (50)WebAssembly (51)binary. In (52)Listing (53)1, (54)we (55)provide (56)an (57)example (58)of (59)a (60)Rust (61)program (62)that (63)contains (64)a (65)function (66)declaration, (67)a (68)loop, (69)a (70)loop (71)conditional, (72)and (73)a (74)memory (75)access. When (76)the (77)Rust (78)code (79)is (80)compiled (81)to (82)WebAssembly, (83)it (84)produces (85)the (86)code (87)shown (88)in (89)Listing (90)2.

Suggestions

  • runtime,

Atruntime,

replace 'Atruntime,' by 'At'

Happy suggestion

(0)At (1)runtime, (2)WebAssembly (3)programs (4)operate (5)on (6)a (7)virtual (8)stack (9)that (10)holds (11)primitive (12)data (13)types. Such (14)data (15)is (16)then (17)operated (18)by (19)typed (20)stack (21)instructions. A (22)WebAssembly (23)program (24)also (25)declares (26)linear (27)memory (28)and (29)globals, (30)which (31)are (32)used (33)to (34)store, (35)manipulate, (36)and (37)share (38)data (39)during (40)program (41)execution, (42)e.g. To (43)share (44)data (45)with (46)the (47)host (48)engine (49)of (50)the (51)WebAssembly (52)binary. In (53)Listing (54)1, (55)we (56)provide (57)an (58)example (59)of (60)a (61)Rust (62)program (63)that (64)contains (65)a (66)function (67)declaration, (68)a (69)loop, (70)a (71)loop (72)conditional, (73)and (74)a (75)memory (76)access. When (77)the (78)Rust (79)code (80)is (81)compiled (82)to (83)WebAssembly, (84)it (85)produces (86)the (87)code (88)shown (89)in (90)Listing (91)2.

(0)Atruntime, (1)WebAssembly (2)programs (3)operate (4)on (5)a (6)virtual (7)stack (8)that (9)holds (10)primitive (11)data (12)types. Such (13)data (14)is (15)then (16)operated (17)by (18)typed (19)stack (20)instructions. A (21)WebAssembly (22)program (23)also (24)declares (25)linear (26)memory (27)and (28)globals, (29)which (30)are (31)used (32)to (33)store, (34)manipulate, (35)and (36)share (37)data (38)during (39)program (40)execution, (41)e.g. to (42)share (43)data (44)with (45)the (46)host (47)engine (48)of (49)the (50)WebAssembly (51)binary. In (52)Listing (53)1, (54)we (55)provide (56)an (57)example (58)of (59)a (60)Rust (61)program (62)that (63)contains (64)a (65)function (66)declaration, (67)a (68)loop, (69)a (70)loop (71)conditional, (72)and (73)a (74)memory (75)access. When (76)the (77)Rust (78)code (79)is (80)compiled (81)to (82)WebAssembly, (83)it (84)produces (85)the (86)code (87)shown (88)in (89)Listing (90)2.

Suggestions

  • At

https://cranelift.dev/

delete 'https://cranelift.dev/' by ''

Happy suggestion

(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. https://cranelift.dev/ (14)1 (15)https://cranelift.dev/ (16)1 (17)https://cranelift.dev/ (18)1 (19)https://cranelift.dev/ (20)1 (21)https://cranelift.dev/ (22)1 (23)https://cranelift.dev/ (24)1 (25)https://cranelift.dev/ (26)1 (27)https://cranelift.dev/ (28)1 (29)https://cranelift.dev/ (30)1 (31)https://cranelift.dev/ (32)1 (33)https://cranelift.dev/ (34)1

(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. (14)1 (15)https://cranelift.dev/

Suggestions

insert '' by 'https://cranelift.dev/'

Happy suggestion

(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. https://cranelift.dev/ (14)1 (15)https://cranelift.dev/ (16)1 (17)https://cranelift.dev/ (18)1 (19)https://cranelift.dev/ (20)1 (21)https://cranelift.dev/ (22)1 (23)https://cranelift.dev/ (24)1 (25)https://cranelift.dev/ (26)1 (27)https://cranelift.dev/ (28)1 (29)https://cranelift.dev/ (30)1 (31)https://cranelift.dev/ (32)1 (33)https://cranelift.dev/ (34)1

(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. (14)1 (15)https://cranelift.dev/

Suggestions

  • https://cranelift.dev/

insert '' by '1'

Happy suggestion

(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. https://cranelift.dev/ (14)1 (15)https://cranelift.dev/ (16)1 (17)https://cranelift.dev/ (18)1 (19)https://cranelift.dev/ (20)1 (21)https://cranelift.dev/ (22)1 (23)https://cranelift.dev/ (24)1 (25)https://cranelift.dev/ (26)1 (27)https://cranelift.dev/ (28)1 (29)https://cranelift.dev/ (30)1 (31)https://cranelift.dev/ (32)1 (33)https://cranelift.dev/ (34)1

(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. (14)1 (15)https://cranelift.dev/

Suggestions

  • 1

WebAssembly

replace 'WebAssembly' by 'WebAssembly.'

Happy suggestion

(0)2.1. WebAssembly.

(0)2.1. WebAssembly

Suggestions

  • WebAssembly.

gen-erate

replace 'gen-erate' by 'generate'

Happy suggestion

(0)Our (1)results (2)demonstrate (3)that (4)WASM-MUTATE (5)can (6)generate (7)thousands (8)of (9)variants (10)in (11)minutes. These (12)variants (13)have (14)unique (15)machine (16)code (17)after (18)compilation (19)with (20)Cranelift! (21)(static (22)diversity) (23)and (24)the (25)variants (26)exhibit (27)different (28)traces (29)at (30)runtime (31)(dynamic (32)diversity). Moreover, (33)we (34)empirically (35)demonstrate (36)that, (37)in (38)the (39)worst (40)scenario, (41)the (42)performance (43)impact (44)on (45)the (46)generated (47)variants (48)is (49)maintained (50)within (51)the (52)same (53)order (54)of (55)magnitude (56)as (57)the (58)original (59)program. Remarkably, (60)our (61)experiments (62)provide (63)evidence (64)that (65)the (66)generated (67)variants (68)are (69)hardened (70)against (71)Spectre (72)attacks. To (73)sum (74)up, (75)the (76)contributions (77)of (78)this (79)work (80)are:

(0)Our (1)results (2)demonstrate (3)that (4)WASM-MUTATE (5)can (6)gen-erate (7)thousands (8)of (9)variants (10)in (11)minutes. These (12)variants (13)have (14)unique (15)machine (16)code (17)after (18)compilation (19)with (20)Cranelift! (21)(static (22)diversity) (23)and (24)the (25)variants (26)exhibit (27)different (28)traces (29)at (30)runtime (31)(dynamic (32)diversity). Moreover, (33)we (34)empirically (35)demonstrate (36)that, (37)in (38)the (39)worst (40)scenario, (41)the (42)performance (43)impact (44)on (45)the (46)generated (47)variants (48)is (49)maintained (50)within (51)the (52)same (53)order (54)of (55)magnitude (56)as (57)the (58)original (59)program. (60)Remarkably, (61)our (62)experiments (63)provide (64)evidence (65)that (66)the (67)generated (68)variants (69)are (70)hardened (71)against (72)Spectre (73)attacks. To (74)sum (75)up, (76)the (77)contributions (78)of (79)this (80)work (81)are:

Suggestions

  • generate

insert '' by 'Background'

Happy suggestion

(0)2. Background (1)Background (2)Background (3)Background (4)Background (5)Background (6)Background (7)Background (8)Background (9)Background (10)Background (11)Background (12)Background (13)Background (14)Background (15)Background (16)Background (17)Background (18)Background (19)Background (20)Background (21)Background (22)Background (23)Background (24)Background (25)Background (26)Background (27)Background (28)Background (29)Background (30)Background (31)Background (32)Background (33)Background (34)Background (35)Background (36)Background (37)Background (38)Background (39)Background (40)Background (41)Background (42)Background (43)Background (44)Background (45)Background (46)Background (47)Background (48)Background (49)Background (50)Background (51)Background (52)Background (53)Background (54)Background (55)Background (56)Background (57)Background (58)Background (59)Background (60)Background (61)Background (62)Background (63)Background (64)Background (65)Background (66)Background (67)Background (68)Background (69)Background (70)Background (71)Background (72)Background (73)Background (74)Background (75)Background (76)Background (77)Background (78)Background (79)Background (80)Background (81)Background (82)Background (83)Background (84)Background (85)Background (86)Background (87)Background (88)Background (89)Background (90)Background (91)Background (92)Background (93)Background (94)Background (95)Background (96)Background (97)Background (98)Background (99)Background (100)Background (101)Background (102)Background (103)Background (104)Background (105)Background (106)Background (107)Background (108)Background (109)Background (110)Background (111)Background (112)Background

(0)2. Background

Suggestions

  • Background

7

replace '7' by '7,'

Happy suggestion

(0)This (1)paper (2)is (3)structured (4)as (5)follows. In (6)section (7)2, (8)we (9)introduce (10)WebAssembly, (11)the (12)concepts (13)of (14)semantic (15)equivalence, (16)and (17)what (18)we (19)state (20)as (21)a (22)rewriting (23)rule. In (24)section (25)3, (26)we (27)explain (28)and (29)detail (30)the (31)architecture (32)and (33)implementation (34)of (35)WASM-MUTATE. We (36)formulate (37)our (38)research (39)questions (40)in (41)section (42)4, (43)answering (44)them (45)in (46)section (47)5. We (48)discuss (49)open (50)challenges (51)related (52)to (53)our (54)research (55)in (56)section (57)6, (58)to (59)help (60)future (61)research (62)projects (63)on (64)similar (65)topics. In (66)section (67)7, (68)we (69)highlight (70)works (71)related (72)to (73)our (74)research (75)on (76)software (77)diversification. We (78)finalize (79)with (80)our (81)conclusions (82)section (83)8.

(0)This (1)paper (2)is (3)structured (4)as (5)follows. In (6)section (7)2, (8)we (9)introduce (10)WebAssembly, (11)the (12)concepts (13)of (14)semantic (15)equivalence, (16)and (17)what (18)we (19)state (20)as (21)a (22)rewriting (23)rule. In (24)section (25)3, (26)we (27)explain (28)and (29)detail (30)the (31)architecture (32)and (33)implementation (34)of (35)WASM-MUTATE. We (36)formulate (37)our (38)research (39)questions (40)in (41)section (42)4, (43)answering (44)them (45)in (46)section (47)5. (48)We (49)discuss (50)open (51)challenges (52)related (53)to (54)our (55)research (56)in (57)section (58)6, (59)to (60)help (61)future (62)research (63)projects (64)on (65)similar (66)topics. (67)In (68)section (69)7 (70)we (71)highlight (72)works (73)related (74)to (75)our (76)research (77)on (78)software (79)diversification. We (80)finalize (81)with (82)our (83)conclusions (84)section (85)8.

Suggestions

  • 7,

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)2 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)2 (5)of (6)25

Suggestions

  • 25.

$main))

delete '$main))' by ''

Happy suggestion

(0)Listing (1)2: (2)Simplified (3)WebAssembly (4)code (5)for (6)the (7)program (8)of (9)Listing (10)1.

(0)(start (1)$main)) (2)Listing (3)2: (4)Simplified (5)WebAssembly (6)code (7)for (8)the (9)program (10)of (11)Listing (12)1.

Suggestions

(start

delete '(start' by ''

Happy suggestion

(0)Listing (1)2: (2)Simplified (3)WebAssembly (4)code (5)for (6)the (7)program (8)of (9)Listing (10)1.

(0)(start (1)$main)) (2)Listing (3)2: (4)Simplified (5)WebAssembly (6)code (7)for (8)the (9)program (10)of (11)Listing (12)1.

Suggestions

insert '' by '$sum'

Happy suggestion

(0)Local.get (1)$sum (2)call (3)$printlin.get (4)$sum (5)call (6)$printlin.get (7)$sum (8)call (9)$printlin.get (10)$sum (11)call (12)$printlin.get (13)$sum (14)call (15)$printlin.get (16)$sum (17)call (18)$printlin.get (19)$sum (20)call (21)$printlin.get (22)$sum (23)call (24)$printlin.get (25)$sum (26)call (27)$printlin.get (28)$sum (29)call (30)$printlin.get (31)$sum (32)call (33)$printlin.get (34)$sum (35)call (36)$printlin.get (37)$sum

(0)local.get (1)$sum (2)call (3)$printlin

Suggestions

  • $sum

$printlin

replace '$printlin' by '$printlin.get'

Happy suggestion

(0)Local.get (1)$sum (2)call (3)$printlin.get (4)$sum (5)call (6)$printlin.get (7)$sum (8)call (9)$printlin.get (10)$sum (11)call (12)$printlin.get (13)$sum (14)call (15)$printlin.get (16)$sum (17)call (18)$printlin.get (19)$sum (20)call (21)$printlin.get (22)$sum (23)call (24)$printlin.get (25)$sum (26)call (27)$printlin.get (28)$sum (29)call (30)$printlin.get (31)$sum (32)call (33)$printlin.get (34)$sum (35)call (36)$printlin.get (37)$sum

(0)local.get (1)$sum (2)call (3)$printlin

Suggestions

  • $printlin.get

insert '' by '$printlin.get'

Happy suggestion

(0)Local.get (1)$sum (2)call (3)$printlin.get (4)$sum (5)call (6)$printlin.get (7)$sum (8)call (9)$printlin.get (10)$sum (11)call (12)$printlin.get (13)$sum (14)call (15)$printlin.get (16)$sum (17)call (18)$printlin.get (19)$sum (20)call (21)$printlin.get (22)$sum (23)call (24)$printlin.get (25)$sum (26)call (27)$printlin.get (28)$sum (29)call (30)$printlin.get (31)$sum (32)call (33)$printlin.get (34)$sum (35)call (36)$printlin.get (37)$sum

(0)local.get (1)$sum (2)call (3)$printlin

Suggestions

  • $printlin.get

insert '' by 'call'

Happy suggestion

(0)Local.get (1)$sum (2)call (3)$printlin.get (4)$sum (5)call (6)$printlin.get (7)$sum (8)call (9)$printlin.get (10)$sum (11)call (12)$printlin.get (13)$sum (14)call (15)$printlin.get (16)$sum (17)call (18)$printlin.get (19)$sum (20)call (21)$printlin.get (22)$sum (23)call (24)$printlin.get (25)$sum (26)call (27)$printlin.get (28)$sum (29)call (30)$printlin.get (31)$sum (32)call (33)$printlin.get (34)$sum (35)call (36)$printlin.get (37)$sum

(0)local.get (1)$sum (2)call (3)$printlin

Suggestions

  • call

local.get

replace 'local.get' by 'Local.get'

Happy suggestion

(0)Local.get (1)$sum (2)call (3)$printlin.get (4)$sum (5)call (6)$printlin.get (7)$sum (8)call (9)$printlin.get (10)$sum (11)call (12)$printlin.get (13)$sum (14)call (15)$printlin.get (16)$sum (17)call (18)$printlin.get (19)$sum (20)call (21)$printlin.get (22)$sum (23)call (24)$printlin.get (25)$sum (26)call (27)$printlin.get (28)$sum (29)call (30)$printlin.get (31)$sum (32)call (33)$printlin.get (34)$sum (35)call (36)$printlin.get (37)$sum

(0)local.get (1)$sum (2)call (3)$printlin

Suggestions

  • Local.get

tuple,

replace 'tuple,' by 'triple,'

Happy suggestion

(0)Our (1)definition (2)of (3)a (4)rewriting (5)rule (6)draws (7)from (8)the (9)one (10)proposed (11)by (12)Sasnauskas (13)et (14)al. [43], (15)and (16)integrates (17)a (18)predicate (19)to (20)specify (21)the (22)replacement (23)condition. Concretely, (24)a (25)rewriting (26)rule (27)is (28)defined (29)as (30)a (31)triple, (32)denoted (33)as (34)(LHs, (35)RHS, (36)Cond). Here, (37)tus (38)refers (39)to (40)the (41)code (42)segment (43)slated (44)for (45)replacement, (46)RHs (47)is (48)the (49)proposed (50)replacement, (51)and (52)cond (53)stipulates (54)the (55)conditions (56)under (57)which (58)the (59)replacement (60)is (61)acceptable. Importantly, (62)LHs (63)and (64)rHs (65)are (66)meant (67)to (68)be (69)functionally (70)equivalent.

(0)Our (1)definition (2)of (3)a (4)rewriting (5)rule (6)draws (7)from (8)the (9)one (10)proposed (11)by (12)Sasnauskas (13)et (14)al. [43], (15)and (16)integrates (17)a (18)predicate (19)to (20)specify (21)the (22)replacement (23)condition. Concretely, (24)a (25)rewriting (26)rule (27)is (28)defined (29)as (30)a (31)tuple, (32)denoted (33)as (34)(LHs, (35)RHS, (36)Cond). Here, (37)tus (38)refers (39)to (40)the (41)code (42)segment (43)slated (44)for (45)replacement, (46)RHs (47)is (48)the (49)proposed (50)replacement, (51)and (52)cond (53)stipulates (54)the (55)conditions (56)under (57)which (58)the (59)replacement (60)is (61)acceptable. Importantly, (62)LHs (63)and (64)rHs (65)are (66)meant (67)to (68)be (69)functionally (70)equivalent.

Suggestions

  • triple,

rules

replace 'rules' by 'rules.'

Happy suggestion

(0)2.2. Rewriting (1)rules.

(0)2.2. Rewriting (1)rules

Suggestions

  • rules.

end

replace 'end' by 'end.'

Happy suggestion

(0)i32.const (1)@ (2)end (3)end.

(0)i32.const (1)@ (2)end (3)end

Suggestions

  • end.

i32

This sentence does not start with an uppercase letter.

Happy suggestion

i32.const @ end end

Suggestions

  • I32

else

replace 'else' by 'else.'

Happy suggestion

(0)Local.get (1)$i (2)i32.const (3)1 (4)i32.add (5)local.set (6)$i (7)br (8)@ (9)else.

(0)local.get (1)$i (2)i32.const (3)1 (4)i32.add (5)local.set (6)$i (7)br (8)@ (9)else

Suggestions

  • else.

local.get

replace 'local.get' by 'Local.get'

Happy suggestion

(0)Local.get (1)$i (2)i32.const (3)1 (4)i32.add (5)local.set (6)$i (7)br (8)@ (9)else.

(0)local.get (1)$i (2)i32.const (3)1 (4)i32.add (5)local.set (6)$i (7)br (8)@ (9)else

Suggestions

  • Local.get

local

This sentence does not start with an uppercase letter.

Happy suggestion

local.get $i i32.const 1 i32.add local.set $i br @ else

Suggestions

  • Local

$arr_offset

replace '$arr_offset' by '$ir_offset'

Happy suggestion

(0)Local.get (1)$arr_offset (2)local.get (3)$ir_offset (4)local.get (5)$ir_offset (6)local.get (7)$ir_offset (8)local.get (9)$ir_offset (10)local.get (11)$ir_offset (12)local.get (13)$ir_offset (14)local.get (15)$ir_offset (16)local.get (17)$ir_offset (18)local.get (19)$ir_offset (20)local.get (21)$ir_offset (22)local.get (23)$ir_offset (24)local.get (25)$i

(0)local.get (1)$arr_offset (2)local.get (3)$i

Suggestions

  • $ir_offset

insert '' by '$ir_offset'

Happy suggestion

(0)Local.get (1)$arr_offset (2)local.get (3)$ir_offset (4)local.get (5)$ir_offset (6)local.get (7)$ir_offset (8)local.get (9)$ir_offset (10)local.get (11)$ir_offset (12)local.get (13)$ir_offset (14)local.get (15)$ir_offset (16)local.get (17)$ir_offset (18)local.get (19)$ir_offset (20)local.get (21)$ir_offset (22)local.get (23)$ir_offset (24)local.get (25)$i

(0)local.get (1)$arr_offset (2)local.get (3)$i

Suggestions

  • $ir_offset

insert '' by 'local.get'

Happy suggestion

(0)Local.get (1)$arr_offset (2)local.get (3)$ir_offset (4)local.get (5)$ir_offset (6)local.get (7)$ir_offset (8)local.get (9)$ir_offset (10)local.get (11)$ir_offset (12)local.get (13)$ir_offset (14)local.get (15)$ir_offset (16)local.get (17)$ir_offset (18)local.get (19)$ir_offset (20)local.get (21)$ir_offset (22)local.get (23)$ir_offset (24)local.get (25)$i

(0)local.get (1)$arr_offset (2)local.get (3)$i

Suggestions

  • local.get

insert '' by '$arr_offset'

Happy suggestion

(0)Local.get (1)$arr_offset (2)local.get (3)$ir_offset (4)local.get (5)$ir_offset (6)local.get (7)$ir_offset (8)local.get (9)$ir_offset (10)local.get (11)$ir_offset (12)local.get (13)$ir_offset (14)local.get (15)$ir_offset (16)local.get (17)$ir_offset (18)local.get (19)$ir_offset (20)local.get (21)$ir_offset (22)local.get (23)$ir_offset (24)local.get (25)$i

(0)local.get (1)$arr_offset (2)local.get (3)$i

Suggestions

  • $arr_offset

insert '' by 'Local.get'

Happy suggestion

(0)Local.get (1)$arr_offset (2)local.get (3)$ir_offset (4)local.get (5)$ir_offset (6)local.get (7)$ir_offset (8)local.get (9)$ir_offset (10)local.get (11)$ir_offset (12)local.get (13)$ir_offset (14)local.get (15)$ir_offset (16)local.get (17)$ir_offset (18)local.get (19)$ir_offset (20)local.get (21)$ir_offset (22)local.get (23)$ir_offset (24)local.get (25)$i

(0)local.get (1)$arr_offset (2)local.get (3)$i

Suggestions

  • Local.get

local

This sentence does not start with an uppercase letter.

Happy suggestion

local.get $arr_offset local.get $i

Suggestions

  • Local

if

delete 'if' by ''

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

132.1t_s

replace '132.1t_s' by 'not.'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • not.

5

replace '5' by 'if'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • if

i32.const

replace 'i32.const' by '132.1t_s'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • 132.1t_s

$i

replace '$i' by '5'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • 5

local.get

replace 'local.get' by 'i32.const'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • i32.const

loop

replace 'loop' by '$i'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • $i

i32.store

replace 'i32.store' by 'local.get'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • local.get

132.store

replace '132.store' by 'loop'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • loop

1

replace '1' by 'i32.store'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • i32.store

i32.const

replace 'i32.const' by '132.store'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • 132.store

@

replace '@' by '1'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • 1

insert '' by '@'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • @

insert '' by 'i32.const'

Happy suggestion

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.

(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if

Suggestions

  • i32.const

i32

This sentence does not start with an uppercase letter.

Happy suggestion

i32.const @ i32.const 1 132.store i32.store loop local.get $i i32.const 5 132.1t_s if

Suggestions

  • I32

insert '' by '$'

Happy suggestion

(0)i32.const (1)@ (2)local.set (3)$arr_offset (4)$arr_offset (5)$arr_offset (6)$arr_offset (7)$arr_offset (8)$arr_offset (9)$arr_offset (10)$arr_offset (11)$arr_offset (12)$arr_offset (13)$arr_offset (14)$arr_offset (15)$arr_offset (16)$arr_offset (17)$arr_offset (18)$arr_offset (19)$arr_offset (20)$

(0)i32.const (1)@ (2)local.set (3)$arr_offset

Suggestions

  • $

insert '' by '$arr_offset'

Happy suggestion

(0)i32.const (1)@ (2)local.set (3)$arr_offset (4)$arr_offset (5)$arr_offset (6)$arr_offset (7)$arr_offset (8)$arr_offset (9)$arr_offset (10)$arr_offset (11)$arr_offset (12)$arr_offset (13)$arr_offset (14)$arr_offset (15)$arr_offset (16)$arr_offset (17)$arr_offset (18)$arr_offset (19)$arr_offset (20)$

(0)i32.const (1)@ (2)local.set (3)$arr_offset

Suggestions

  • $arr_offset

i32

This sentence does not start with an uppercase letter.

Happy suggestion

i32.const @ local.set $arr_offset

Suggestions

  • I32

$sum

replace '$sum' by '$sum.'

Happy suggestion

(0)i32.const (1)@ (2)local.set (3)$sum.

(0)i32.const (1)@ (2)local.set (3)$sum

Suggestions

  • $sum.

i32

This sentence does not start with an uppercase letter.

Happy suggestion

i32.const @ local.set $sum

Suggestions

  • I32

i32)

replace 'i32)' by 'i32))'

Happy suggestion

(0)(module (1)(@custom (2)“producer” (3)"llvm..”) (4)(import (5)"env” (6)"println” (7)(func (8)$println (9)(param (10)i32))) (11)(memory (12)1) (13)(export (14)“memory” (15)(memory (16)Q)) (17)(func (18)$main (19)(local (20)$sum (21)i32) (22)(local (23)$i (24)132) (25)(local (26)$arr_offset (27)i32))

(0)(module (1)(@custom (2)“producer” (3)"llvm..”) (4)(import (5)"env” (6)"println” (7)(func (8)$println (9)(param (10)i32))) (11)(memory (12)1) (13)(export (14)“memory” (15)(memory (16)Q)) (17)(func (18)$main (19)(local (20)$sum (21)i32) (22)(local (23)$i (24)132) (25)(local (26)$arr_offset (27)i32)

Suggestions

  • i32))

(

Unpaired symbol: ‘)’ seems to be missing

Happy suggestion

(module (@custom “producer” "llvm..”) (import "env” "println” (func $println (param i32))) (memory 1) (export “memory” (memory Q)) (func $main (local $sum i32) (local $i 132) (local $arr_offset i32)

Suggestions

sum);}

replace 'sum);}' by 'sum);'

Happy suggestion

(0)Printin! (1)("Sum (2)of (3)array (4)elements: (5)", (6)sum); (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.

(0)printin! (1)("Sum (2)of (3)array (4)elements: (5){}", (6)sum);} (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.

Suggestions

  • sum);

{}",

replace '{}",' by '",'

Happy suggestion

(0)Printin! (1)("Sum (2)of (3)array (4)elements: (5)", (6)sum); (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.

(0)printin! (1)("Sum (2)of (3)array (4)elements: (5){}", (6)sum);} (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.

Suggestions

  • ",

printin!

replace 'printin!' by 'Printin!'

Happy suggestion

(0)Printin! (1)("Sum (2)of (3)array (4)elements: (5)", (6)sum); (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.

(0)printin! (1)("Sum (2)of (3)array (4)elements: (5){}", (6)sum);} (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.

Suggestions

  • Printin!

printin

This sentence does not start with an uppercase letter.

Happy suggestion

printin! ("Sum of array elements: {}", sum);} Listing 1: A Rust program containing function declaration, loop, conditional and memory access.

Suggestions

  • Printin

{

delete '{' by ''

Happy suggestion

(0)For (1)i (2)in (3)Q..arr.len() (4) (5)sum (6)+= (7)arr[il];

(0)for (1)i (2)in (3)Q..arr.len() (4){ (5)sum (6)+= (7)arr[il];

Suggestions

for

replace 'for' by 'For'

Happy suggestion

(0)For (1)i (2)in (3)Q..arr.len() (4) (5)sum (6)+= (7)arr[il];

(0)for (1)i (2)in (3)Q..arr.len() (4){ (5)sum (6)+= (7)arr[il];

Suggestions

  • For

Q;

replace 'Q;' by 'Q.'

Happy suggestion

(0)Let (1)mut (2)sum (3)= (4)Q.

(0)let (1)mut (2)sum (3)= (4)Q;

Suggestions

  • Q.

let

replace 'let' by 'Let'

Happy suggestion

(0)Let (1)mut (2)sum (3)= (4)Q.

(0)let (1)mut (2)sum (3)= (4)Q;

Suggestions

  • Let

constrained

replace 'constrained' by 'restricted'

Happy suggestion

(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)to (12)as (13)Software (14)Fault (15)Isolation (16)(SFD). For (17)instance, (18)a (19)WebAssembly (20)binary (21)cannot (22)access (23)the (24)memory (25)of (26)other (27)binaries (28)or (29)cannot (30)interact (31)directly (32)with (33)the (34)browser’s (35)APIs, (36)such (37)as (38)the (39)DOM (40)or (41)the (42)network. Instead, (43)communication (44)with (45)these (46)features (47)is (48)restricted (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. Overall, (97)the (98)"least (99)privilege" (100)principle (101)is (102)the (103)fundamental (104)security (105)requirement. This (106)principle (107)is (108)reflected (109)in (110)the (111)lack (112)of (113)certain (114)features (115)that (116)are (117)common (118)in (119)other (120)programming (121)environments. For (122)example, (123)reflection, (124)a (125)feature (126)available (127)in (128)many (129)high-level (130)programming (131)languages (132)like (133)Java (134)and (135)C#, (136)is (137)not (138)possible (139)in (140)WebAssembly.

(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)as (12)Software (13)Fault (14)Isolation (15)(SFD. For (16)instance, (17)a (18)WebAssembly (19)binary (20)cannot (21)access (22)the (23)memory (24)of (25)other (26)binaries (27)or (28)cannot (29)interact (30)directly (31)with (32)the (33)browser’s (34)APIs, (35)such (36)as (37)the (38)DOM (39)or (40)the (41)network. (42)Instead, (43)communication (44)with (45)these (46)features (47)is (48)constrained (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. (97)Overall, (98)the (99)"least (100)privilege" (101)principle (102)is (103)the (104)fundamental (105)security (106)requirement. This (107)principle (108)is (109)reflected (110)in (111)the (112)lack (113)of (114)certain (115)features (116)that (117)are (118)common (119)in (120)other (121)programming (122)environments. For (123)example, (124)reflection, (125)a (126)feature (127)available (128)in (129)many (130)high-level (131)programming (132)languages (133)like (134)Java (135)and (136)C#, (137)is (138)not (139)possible (140)in (141)WebAssembly.

Suggestions

  • restricted

(SFD.

replace '(SFD.' by '(SFD).'

Happy suggestion

(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)to (12)as (13)Software (14)Fault (15)Isolation (16)(SFD). For (17)instance, (18)a (19)WebAssembly (20)binary (21)cannot (22)access (23)the (24)memory (25)of (26)other (27)binaries (28)or (29)cannot (30)interact (31)directly (32)with (33)the (34)browser’s (35)APIs, (36)such (37)as (38)the (39)DOM (40)or (41)the (42)network. Instead, (43)communication (44)with (45)these (46)features (47)is (48)restricted (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. Overall, (97)the (98)"least (99)privilege" (100)principle (101)is (102)the (103)fundamental (104)security (105)requirement. This (106)principle (107)is (108)reflected (109)in (110)the (111)lack (112)of (113)certain (114)features (115)that (116)are (117)common (118)in (119)other (120)programming (121)environments. For (122)example, (123)reflection, (124)a (125)feature (126)available (127)in (128)many (129)high-level (130)programming (131)languages (132)like (133)Java (134)and (135)C#, (136)is (137)not (138)possible (139)in (140)WebAssembly.

(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)as (12)Software (13)Fault (14)Isolation (15)(SFD. For (16)instance, (17)a (18)WebAssembly (19)binary (20)cannot (21)access (22)the (23)memory (24)of (25)other (26)binaries (27)or (28)cannot (29)interact (30)directly (31)with (32)the (33)browser’s (34)APIs, (35)such (36)as (37)the (38)DOM (39)or (40)the (41)network. (42)Instead, (43)communication (44)with (45)these (46)features (47)is (48)constrained (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. (97)Overall, (98)the (99)"least (100)privilege" (101)principle (102)is (103)the (104)fundamental (105)security (106)requirement. This (107)principle (108)is (109)reflected (110)in (111)the (112)lack (113)of (114)certain (115)features (116)that (117)are (118)common (119)in (120)other (121)programming (122)environments. For (123)example, (124)reflection, (125)a (126)feature (127)available (128)in (129)many (130)high-level (131)programming (132)languages (133)like (134)Java (135)and (136)C#, (137)is (138)not (139)possible (140)in (141)WebAssembly.

Suggestions

  • (SFD).

insert '' by 'to'

Happy suggestion

(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)to (12)as (13)Software (14)Fault (15)Isolation (16)(SFD). For (17)instance, (18)a (19)WebAssembly (20)binary (21)cannot (22)access (23)the (24)memory (25)of (26)other (27)binaries (28)or (29)cannot (30)interact (31)directly (32)with (33)the (34)browser’s (35)APIs, (36)such (37)as (38)the (39)DOM (40)or (41)the (42)network. Instead, (43)communication (44)with (45)these (46)features (47)is (48)restricted (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. Overall, (97)the (98)"least (99)privilege" (100)principle (101)is (102)the (103)fundamental (104)security (105)requirement. This (106)principle (107)is (108)reflected (109)in (110)the (111)lack (112)of (113)certain (114)features (115)that (116)are (117)common (118)in (119)other (120)programming (121)environments. For (122)example, (123)reflection, (124)a (125)feature (126)available (127)in (128)many (129)high-level (130)programming (131)languages (132)like (133)Java (134)and (135)C#, (136)is (137)not (138)possible (139)in (140)WebAssembly.

(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)as (12)Software (13)Fault (14)Isolation (15)(SFD. For (16)instance, (17)a (18)WebAssembly (19)binary (20)cannot (21)access (22)the (23)memory (24)of (25)other (26)binaries (27)or (28)cannot (29)interact (30)directly (31)with (32)the (33)browser’s (34)APIs, (35)such (36)as (37)the (38)DOM (39)or (40)the (41)network. (42)Instead, (43)communication (44)with (45)these (46)features (47)is (48)constrained (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. (97)Overall, (98)the (99)"least (100)privilege" (101)principle (102)is (103)the (104)fundamental (105)security (106)requirement. This (107)principle (108)is (109)reflected (110)in (111)the (112)lack (113)of (114)certain (115)features (116)that (117)are (118)common (119)in (120)other (121)programming (122)environments. For (123)example, (124)reflection, (125)a (126)feature (127)available (128)in (129)many (130)high-level (131)programming (132)languages (133)like (134)Java (135)and (136)C#, (137)is (138)not (139)possible (140)in (141)WebAssembly.

Suggestions

  • to

(

Unpaired symbol: ‘)’ seems to be missing

Happy suggestion

WebAssembly is designed with isolation as a primary consideration, usually referred as Software Fault Isolation (SFD. For instance, a WebAssembly binary cannot access the memory of other binaries or cannot interact directly with the browser’s APIs, such as the DOM or the network. Instead, communication with these features is constrained to functions imported from the host engine, ensuring a secure and safe WebAssembly environment. Moreover, control flow in WebAssembly is managed through explicit labels and well-defined blocks, which means that jumps in the program can only occur inside blocks, unlike regular assembly code [24]. Besides, function tables are constructed statically. Overall, the "least privilege" principle is the fundamental security requirement. This principle is reflected in the lack of certain features that are common in other programming environments. For example, reflection, a feature available in many high-level programming languages like Java and C#, is not possible in WebAssembly.

Suggestions

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)3 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)3 (5)of (6)25

Suggestions

  • 25.

WASM-MUTATE

replace 'WASM-MUTATE' by 'WASM-MUTATE.'

Happy suggestion

(0)3. Design (1)of (2)WASM-MUTATE.

(0)3. Design (1)of (2)WASM-MUTATE

Suggestions

  • WASM-MUTATE.

cond

replace 'cond' by 'condition'

Happy suggestion

(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9)) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)conditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)condition (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.

(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9){}) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)con-ditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)cond (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.

Suggestions

  • condition

con-ditions.

replace 'con-ditions.' by 'conditions.'

Happy suggestion

(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9)) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)conditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)condition (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.

(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9){}) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)con-ditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)cond (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.

Suggestions

  • conditions.

{})

replace '{})' by ')'

Happy suggestion

(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9)) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)conditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)condition (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.

(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9){}) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)con-ditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)cond (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.

Suggestions

  • )

Unpaired symbol: ‘‘’ seems to be missing

Happy suggestion

For example, the rewriting rule (x, x i32.or x, {}) implies that the Lys ’x’ is to be replaced by an idempotent bitwise i32.or operation with itself, absent any specific con-ditions. Notice that, for this specific rule, the commutative property shared by Lus and rus, symbolized as (LHS, RHS)= (RHS, LHS). Besides, the cond element could be an arbitrary criterion. For instance, the condition for applying the aforementioned rewriting rule could be to ensure that the newly created binary file does not exceed a threshold binary size.

Suggestions

domain

replace 'domain' by 'domain,'

Happy suggestion

(0)We (1)focus (2)on (3)rewriting (4)rules (5)that (6)guarantee (7)functional (8)equivalence. Functional (9)equivalence (10)refers (11)to (12)the (13)notion (14)that (15)two (16)programs (17)are (18)considered (19)equivalent (20)if, (21)for (22)the (23)same (24)input (25)of (26)the (27)same (28)domain, (29)they (30)produce (31)the (32)same (33)output[32].

(0)We (1)focus (2)on (3)rewriting (4)rules (5)that (6)guarantee (7)functional (8)equivalence. Functional (9)equivalence (10)refers (11)to (12)the (13)notion (14)that (15)two (16)programs (17)are (18)considered (19)equivalent (20)if, (21)for (22)the (23)same (24)input (25)of (26)the (27)same (28)domain (29)they (30)produce (31)the (32)same (33)output[32].

Suggestions

  • domain,

insert '' by 'Overview'

Happy suggestion

(0)3.1. Overview (1)Overview (2)Overview (3)Overview (4)Overview (5)Overview (6)Overview (7)Overview (8)Overview (9)Overview (10)Overview (11)Overview (12)Overview (13)Overview (14)Overview (15)Overview (16)Overview (17)Overview (18)Overview (19)Overview (20)Overview (21)Overview (22)Overview (23)Overview (24)Overview (25)Overview (26)Overview (27)Overview (28)Overview (29)Overview (30)Overview (31)Overview (32)Overview (33)Overview (34)Overview (35)Overview (36)Overview (37)Overview (38)Overview (39)Overview (40)Overview (41)Overview (42)Overview (43)Overview (44)Overview (45)Overview (46)Overview (47)Overview (48)Overview (49)Overview (50)Overview (51)Overview (52)Overview (53)Overview (54)Overview (55)Overview (56)Overview (57)Overview (58)Overview (59)Overview (60)Overview (61)Overview (62)Overview (63)Overview (64)Overview (65)Overview (66)Overview (67)Overview (68)Overview (69)Overview (70)Overview (71)Overview (72)Overview (73)Overview (74)Overview (75)Overview (76)Overview (77)Overview (78)Overview (79)Overview (80)Overview (81)Overview (82)Overview (83)Overview (84)Overview (85)Overview (86)Overview (87)Overview (88)Overview (89)Overview (90)Overview (91)Overview (92)Overview (93)Overview (94)Overview (95)Overview (96)Overview (97)Overview (98)Overview

(0)3.1. Overview

Suggestions

  • Overview

e-graph e-graph

Possible typo: you repeated a word

Happy suggestion

Input wasm binary transformed binary IR y IR 2 4 oe 0 meray ee O'To e-graph e-graph Lt apaeeaeien ee ! traversal Output diversified wasm binary wasm-mutate / Figure 1: WASM-MUTATE high-level architecture. It generates semantically equivalent variants from a given WebAssembly binary input. Its central approach involves synthesizing these variants by substituting parts of the original binary using rewriting rules, boosted by diversification space traversals using e-graphs(refer to subsection 3.3).

Suggestions

  • e-graph

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)4 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)4 (5)of (6)25

Suggestions

  • 25.

i64)))

replace 'i64)))' by 'i64))'

Happy suggestion

(0)RHS (1)(module (2)(type (3)(;2;) (4)(func (5)(param (6)i32 (7)£32) (8)(result (9)i64)) (10)a (11)(func (12)() (13)(type (14)@) (15)(param (16)i32 (17)£32) (18)(result (19)i64) (20)eee (21)i64.const (22)Q)

(0)RHS (1)(module (2)(type (3)(;2;) (4)(func (5)(param (6)i32 (7)£32) (8)(result (9)i64))) (10)a (11)(func (12)() (13)(type (14)@) (15)(param (16)i32 (17)£32) (18)(result (19)i64) (20)eee (21)i64.const (22)Q)

Suggestions

  • i64))

i64)))

replace 'i64)))' by 'i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))'

Happy suggestion

(0)LHS (1)(module (2)(type (3)() (4)(func (5)(param (6)i32 (7)£32) (8)(result (9)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)LHS (1)(module (2)(type (3)() (4)(func (5)(param (6)i32 (7)£32) (8)(result (9)i64)))

Suggestions

  • i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

having

delete 'having' by ''

Happy suggestion

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.

Suggestions

colleagues

replace 'colleagues' by 'have'

Happy suggestion

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.

Suggestions

  • have

and

replace 'and' by 'colleagues'

Happy suggestion

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.

Suggestions

  • colleagues

Narayan

replace 'Narayan' by 'and'

Happy suggestion

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.

Suggestions

  • and

With

replace 'With' by 'Narayan'

Happy suggestion

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.

Suggestions

  • Narayan

ac-tors

replace 'ac-tors' by 'attackers'

Happy suggestion

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.

(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.

Suggestions

  • attackers

)

Unpaired symbol: ‘(’ seems to be missing

Happy suggestion

RHS -(module (import "" "" (func)))

Suggestions

signa-tures

replace 'signa-tures' by 'signs'

Happy suggestion

(0)This (1)transformation (2)generates (3)random (4)function (5)signs (6)with (7)a (8)random (9)number (10)of (11)parameters (12)and (13)results (14)count. This (15)rewriting (16)rule (17)does (18)not (19)affect (20)the (21)runtime (22)behavior (23)of (24)the (25)variant. It (26)also (27)guarantees (28)that (29)the (30)index (31)of (32)the (33)already (34)defined (35)types (36)is (37)consistent (38)after (39)the (40)addition (41)of (42)a (43)new (44)type. This (45)is (46)because (47)WebAssembly (48)programs (49)cannot (50)access (51)or (52)use (53)a (54)type (55)definition (56)during (57)runtime, (58)they (59)are (60)only (61)used (62)to (63)validate (64)the (65)signature (66)of (67)a (68)function (69)during (70)compilation (71)and (72)validation (73)in (74)the (75)host (76)engine. From (77)the (78)security (79)perspective, (80)this (81)transformation (82)prevents (83)static (84)binary (85)analysis. For (86)example, (87)to (88)avoid (89)malware (90)detection (91)based (92)on (93)a (94)signature (95)set (96)[8].

(0)This (1)transformation (2)generates (3)random (4)function (5)signa-tures (6)with (7)a (8)random (9)number (10)of (11)parameters (12)and (13)results (14)count. (15)This (16)rewriting (17)rule (18)does (19)not (20)affect (21)the (22)runtime (23)behavior (24)of (25)the (26)variant. It (27)also (28)guarantees (29)that (30)the (31)index (32)of (33)the (34)already (35)defined (36)types (37)is (38)consistent (39)after (40)the (41)addition (42)of (43)a (44)new (45)type. (46)This (47)is (48)because (49)WebAssembly (50)programs (51)cannot (52)access (53)or (54)use (55)a (56)type (57)definition (58)during (59)runtime, (60)they (61)are (62)only (63)used (64)to (65)validate (66)the (67)signature (68)of (69)a (70)function (71)during (72)compilation (73)and (74)validation (75)in (76)the (77)host (78)engine. From (79)the (80)security (81)perspective, (82)this (83)transformation (84)prevents (85)static (86)binary (87)analysis. For (88)example, (89)to (90)avoid (91)malware (92)detection (93)based (94)on (95)a (96)signature (97)set (98)[8].

Suggestions

  • signs

(func)))

replace '(func)))' by '(func))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))'

Happy suggestion

(0)LHS (1)(module (2)(type (3)(func))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)LHS (1)(module (2)(type (3)(func)))

Suggestions

  • (func))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

i64)))

delete 'i64)))' by ''

Happy suggestion

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))

Suggestions

i32

delete 'i32' by ''

Happy suggestion

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))

Suggestions

(result

delete '(result' by ''

Happy suggestion

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))

Suggestions

i64)

delete 'i64)' by ''

Happy suggestion

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))

Suggestions

(param

delete '(param' by ''

Happy suggestion

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))

Suggestions

(func

delete '(func' by ''

Happy suggestion

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))

Suggestions

i64))))

replace 'i64))))' by 'i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))'

Happy suggestion

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))

Suggestions

  • i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

removes:

replace 'removes:' by 'removes'

Happy suggestion

(0)Remove (1)dead (2)code: (3)WASM-MUTATE (4)can (5)randomly (6)remove (7)dead (8)code. In (9)particular, (10)WASM-MUTATE (11)removes (12)functions, (13)types, (14)custom (15)sections, (16)imports, (17)tables, (18)memories, (19)globals, (20)data (21)segments, (22)and (23)elements (24)that (25)can (26)be (27)validated (28)as (29)dead (30)code (31)with (32)guarantees. For (33)instance, (34)to (35)delete (36)a (37)memory (38)declaration, (39)the (40)binary (41)code (42)must (43)not (44)contain (45)a (46)memory (47)access (48)operation. Separated (49)rewriting (50)rules (51)are (52)included (53)within (54)WASM-MUTATE (55)for (56)each (57)of (58)the (59)elements (60)above. For (61)a (62)more (63)concrete (64)example, (65)the (66)following (67)listing (68)illustrates (69)the (70)case (71)of (72)a (73)function (74)removal.

(0)Remove (1)dead (2)code: (3)WASM-MUTATE (4)can (5)randomly (6)remove (7)dead (8)code. In (9)particular, (10)WASM-MUTATE (11)removes: (12)functions, (13)types, (14)custom (15)sections, (16)imports, (17)tables, (18)memories, (19)globals, (20)data (21)segments, (22)and (23)elements (24)that (25)can (26)be (27)validated (28)as (29)dead (30)code (31)with (32)guarantees. For (33)instance, (34)to (35)delete (36)a (37)memory (38)declaration, (39)the (40)binary (41)code (42)must (43)not (44)contain (45)a (46)memory (47)access (48)operation. Separated (49)rewriting (50)rules (51)are (52)included (53)within (54)WASM-MUTATE (55)for (56)each (57)of (58)the (59)elements (60)above. For (61)a (62)more (63)concrete (64)example, (65)the (66)following (67)listing (68)illustrates (69)the (70)case (71)of (72)a (73)function (74)removal.

Suggestions

  • removes

i64)))

replace 'i64)))' by 'i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))'

Happy suggestion

(0)Add (1)type: (2)In (3)WebAssembly, (4)the (5)type (6)section (7)wraps (8)definitions (9)of (10)signatures (11)for (12)the (13)binary (14)functions. WASM-MUTATE (15)implements (16)two (17)rewriting (18)rules, (19)one (20)of (21)which (22)is (23)illustrated (24)in (25)the (26)following. LHS (27)(module (28)(type (29)(;2;) (30)(func (31)(param (32)i32) (33)(result (34)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)Add (1)type: (2)In (3)WebAssembly, (4)the (5)type (6)section (7)wraps (8)definitions (9)of (10)signatures (11)for (12)the (13)binary (14)functions. WASM-MUTATE (15)implements (16)two (17)rewriting (18)rules, (19)one (20)of (21)which (22)is (23)illustrated (24)in (25)the (26)following. (27)LHS (28)(module (29)(type (30)(;2;) (31)(func (32)(param (33)i32) (34)(result (35)i64)))

Suggestions

  • i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

imple-mented

replace 'imple-mented' by 'implemented'

Happy suggestion

(0)In (1)total, (2)there (3)are (4)135 (5)possible (6)rewriting (7)rules (8)implemented (9)in (10)WASM-MUTATE, (11)those (12)rules (13)are (14)grouped (15)under (16)several (17)categories, (18)called (19)hereafter (20)meta-rules. For (21)example, (22)125 (23)rewriting (24)rules (25)are (26)implemented (27)as (28)part (29)of (30)a (31)peephole (32)meta-rule. In (33)the (34)following, (35)we (36)present (37)7 (38)meta-rules.

(0)In (1)total, (2)there (3)are (4)135 (5)possible (6)rewriting (7)rules (8)imple-mented (9)in (10)WASM-MUTATE, (11)those (12)rules (13)are (14)grouped (15)under (16)several (17)categories, (18)called (19)hereafter (20)meta-rules. For (21)example, (22)125 (23)rewriting (24)rules (25)are (26)implemented (27)as (28)part (29)of (30)a (31)peephole (32)meta-rule. In (33)the (34)following, (35)we (36)present (37)7 (38)meta-rules.

Suggestions

  • implemented

Rules

replace 'Rules' by 'Rules.'

Happy suggestion

(0)3.2. WebAssembly (1)Rewriting (2)Rules.

(0)3.2. WebAssembly (1)Rewriting (2)Rules

Suggestions

  • Rules.

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)5 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)5 (5)of (6)25

Suggestions

  • 25.

Mena))

replace 'Mena))' by 'Mena))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))'

Happy suggestion

(0)RHS (1)(module (2)(func...) (3)(132.eqz (4)Cif (5)Bleise (6)Mena))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

(0)RHS (1)(module (2)(func...) (3)(132.eqz (4)Cif (5)Bleise (6)Mena))

Suggestions

  • Mena))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

((block

replace '((block' by '(block'

Happy suggestion

(0)RHS (1)(module (2)(func...) (3)(block (4)(block (5)br_if (6)@ (7)br (8)1 (9)end) (10)(loop (11)br_if (12)0 (13)end) (14)end))

(0)RHS (1)(module (2)(func...) (3)((block (4)(block (5)br_if (6)@ (7)br (8)1 (9)end) (10)(loop (11)br_if (12)0 (13)end) (14)end))

Suggestions

  • (block

if

replace 'if' by 'If'

Happy suggestion

(0)LHS (1)(module (2)(func... Con (3)o-. If (4)@ (5)Blend)

(0)LHS (1)(module (2)(func... (3)con (4)o-. if (5)@ (6)Blend)

Suggestions

  • If

con

replace 'con' by 'Con'

Happy suggestion

(0)LHS (1)(module (2)(func... Con (3)o-. If (4)@ (5)Blend)

(0)LHS (1)(module (2)(func... (3)con (4)o-. if (5)@ (6)Blend)

Suggestions

  • Con

(

Unpaired symbol: ‘)’ seems to be missing

Happy suggestion

LHS (module (func... con o-. if @ Blend)

Suggestions

end)

replace 'end)' by 'ends)!'

Happy suggestion

(0)To (1)swap (2)an (3)if-construction (4)in (5)WebAssembly, (6)WASM-MUTATE (7)inserts (8)a (9)negation (10)of (11)the (12)value (13)at (14)the (15)top (16)of (17)the (18)stack (19)right (20)before (21)the (22)if (23)instruction. In (24)the (25)following (26)rewriting (27)rule, (28)we (29)show (30)how (31)WASM-MUTATE (32)performs (33)this (34)rewriting. LHS (35)(module (36)Funes)! (37)(condition (38)C (39)(if (40)A (41)else (42)B (43)ends)!

(0)To (1)swap (2)an (3)if-construction (4)in (5)WebAssembly, (6)WASM-MUTATE (7)inserts (8)a (9)negation (10)of (11)the (12)value (13)at (14)the (15)top (16)of (17)the (18)stack (19)right (20)before (21)the (22)if (23)instruction. In (24)the (25)following (26)rewriting (27)rule, (28)we (29)show (30)how (31)WASM-MUTATE (32)performs (33)this (34)rewriting. (35)LHS (36)(module (37)Funes)! (38)(condition (39)C (40)(if (41)A (42)else (43)B (44)end)

Suggestions

  • ends)!

swapping:

delete 'swapping:' by ''

Happy suggestion

(0)In (1)WebAssembly, (2)an (3)if-construction (4)consists (5)of (6)a (7)consequence (8)and (9)an (10)alternative. The (11)branching (12)condition (13)is (14)executed (15)right (16)before (17)the (18)if (19)instruction. If (20)the (21)value (22)at (23)the (24)top (25)of (26)the (27)stack (28)is (29)greater (30)than (31)0, (32)then (33)the (34)consequence (35)code (36)is (37)executed, (38)otherwise (39)the (40)alternative (41)code (42)is (43)run. The (44)if (45)swapping (46)transformation (47)swaps (48)the (49)consequence (50)and (51)alternative (52)codes (53)of (54)an (55)if-construction.

(0)If (1)swapping: (2)In (3)WebAssembly, (4)an (5)if-construction (6)consists (7)of (8)a (9)consequence (10)and (11)an (12)alternative. The (13)branching (14)condition (15)is (16)executed (17)right (18)before (19)the (20)if (21)instruction. If (22)the (23)value (24)at (25)the (26)top (27)of (28)the (29)stack (30)is (31)greater (32)than (33)0, (34)then (35)the (36)consequence (37)code (38)is (39)executed, (40)otherwise (41)the (42)alternative (43)code (44)is (45)run. The (46)if (47)swapping (48)transformation (49)swaps (50)the (51)consequence (52)and (53)alternative (54)codes (55)of (56)an (57)if-construction.

Suggestions

If

delete 'If' by ''

Happy suggestion

(0)In (1)WebAssembly, (2)an (3)if-construction (4)consists (5)of (6)a (7)consequence (8)and (9)an (10)alternative. The (11)branching (12)condition (13)is (14)executed (15)right (16)before (17)the (18)if (19)instruction. If (20)the (21)value (22)at (23)the (24)top (25)of (26)the (27)stack (28)is (29)greater (30)than (31)0, (32)then (33)the (34)consequence (35)code (36)is (37)executed, (38)otherwise (39)the (40)alternative (41)code (42)is (43)run. The (44)if (45)swapping (46)transformation (47)swaps (48)the (49)consequence (50)and (51)alternative (52)codes (53)of (54)an (55)if-construction.

(0)If (1)swapping: (2)In (3)WebAssembly, (4)an (5)if-construction (6)consists (7)of (8)a (9)consequence (10)and (11)an (12)alternative. The (13)branching (14)condition (15)is (16)executed (17)right (18)before (19)the (20)if (21)instruction. If (22)the (23)value (24)at (25)the (26)top (27)of (28)the (29)stack (30)is (31)greater (32)than (33)0, (34)then (35)the (36)consequence (37)code (38)is (39)executed, (40)otherwise (41)the (42)alternative (43)code (44)is (45)run. The (46)if (47)swapping (48)transformation (49)swaps (50)the (51)consequence (52)and (53)alternative (54)codes (55)of (56)an (57)if-construction.

Suggestions

end

delete 'end' by ''

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

block...

replace 'block...' by 'End'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • End

new

replace 'new' by 'block.'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • block.

a

replace 'a' by 'new'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • new

of

replace 'of' by 'a'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • a

introduction

replace 'introduction' by 'of'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • of

the

replace 'the' by 'introduction'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • introduction

to

replace 'to' by 'the'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • the

due

replace 'due' by 'to'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • to

required

replace 'required' by 'due'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • due

is

replace 'is' by 'required'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • required

modification

replace 'modification' by 'is'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • is

This

replace 'This' by 'modification'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • modification

one.

replace 'one.' by 'This'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • This

by

replace 'by' by 'one.'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • one.

increased

replace 'increased' by 'by'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • by

indices

replace 'indices' by 'increased'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • increased

jumping

replace 'jumping' by 'indices'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • indices

their

replace 'their' by 'jumping'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • jumping

need

replace 'need' by 'their'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • their

which

replace 'which' by 'need'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • need

body,

replace 'body,' by 'which'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • which

loop

replace 'loop' by 'body,'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • body,

the

replace 'the' by 'loop'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • loop

outside

replace 'outside' by 'the'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • the

jumping

replace 'jumping' by 'outside'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • outside

instructions

replace 'instructions' by 'jumping'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • jumping

branching

replace 'branching' by 'instructions'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • instructions

for

replace 'for' by 'branching'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • branching

except

replace 'except' by 'for'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • for

ones,

replace 'ones,' by 'except'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • except

original

replace 'original' by 'ones,'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • ones,

the

replace 'the' by 'original'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • original

mirror

replace 'mirror' by 'the'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • the

instructions

replace 'instructions' by 'mirror'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • mirror

of

replace 'of' by 'instructions'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • instructions

groups

replace 'groups' by 'of'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • of

replicated

replace 'replicated' by 'groups'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • groups

These

replace 'These' by 'replicated'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • replicated

copied.

replace 'copied.' by 'These'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • These

are

replace 'are' by 'copied.'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • copied.

instructions

replace 'instructions' by 'are'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • are

separated

replace 'separated' by 'groups'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • groups

previously

replace 'previously' by 'separated'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • separated

the

replace 'the' by 'previously'

Happy suggestion

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.

(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.

Suggestions

  • previously

(

Unpaired symbol: ‘)’ seems to be missing

Happy suggestion

RHS (module + (@custom "CS42” "xxx. . “

Suggestions

em-ployed

replace 'em-ployed' by 'employed'

Happy suggestion

(0)Loop (1)Unrolling: (2)Loop (3)unrolling (4)is (5)a (6)technique (7)employed (8)to (9)enhance (10)the (11)performance (12)of (13)programs (14)by (15)reducing (16)loop (17)control (18)overhead (19)[16]. WASM-MUTATE (20)incorporates (21)a (22)loop (23)unrolling (24)transformation (25)and (26)uses (27)the (28)Abstract (29)Syntax (30)Tree (31)(AST) (32)of (33)the (34)original (35)WebAssembly (36)binary (37)to (38)identify (39)loop (40)constructions.

(0)Loop (1)Unrolling: (2)Loop (3)unrolling (4)is (5)a (6)technique (7)em-ployed (8)to (9)enhance (10)the (11)performance (12)of (13)programs (14)by (15)reducing (16)loop (17)control (18)overhead (19)[16]. WASM-MUTATE (20)incorporates (21)a (22)loop (23)unrolling (24)transformation (25)and (26)uses (27)the (28)Abstract (29)Syntax (30)Tree (31)(AST) (32)of (33)the (34)original (35)WebAssembly (36)binary (37)to (38)identify (39)loop (40)constructions.

Suggestions

  • employed

"CS42”

replace '"CS42”' by '"CS42"'

Happy suggestion

(0)LHS (1)(module (2)-(@custom (3)"CS42" (4)"zzz..."

(0)LHS (1)(module (2)-(@custom (3)"CS42” (4)"zzz..."

Suggestions

  • "CS42"

Unpaired symbol: ‘“’ seems to be missing

Happy suggestion

LHS (module -(@custom "CS42” "zzz..."

Suggestions

sections:

delete 'sections:' by ''

Happy suggestion

(0)Custom (1)sections (2)in (3)Web-Assembly (4)are (5)used (6)to (7)store (8)metadata, (9)such (10)as (11)the (12)name (13)of (14)the (15)compiler (16)that (17)produces (18)the (19)binary (20)or (21)the (22)symbol (23)information (24)for (25)debugging. Thus, (26)this (27)section (28)does (29)not (30)affect (31)the (32)execution (33)of (34)the (35)WebAssembly (36)program. WASM-MUTATE (37)includes (38)one (39)transformation (40)to (41)edit (42)custom (43)sections. This (44)is (45)illustrated (46)in (47)the (48)following (49)rewriting (50)rule.

(0)Edit (1)custom (2)sections: (3)Custom (4)sections (5)in (6)Web-Assembly (7)are (8)used (9)to (10)store (11)metadata, (12)such (13)as (14)the (15)name (16)of (17)the (18)compiler (19)that (20)produces (21)the (22)binary (23)or (24)the (25)symbol (26)information (27)for (28)debugging. Thus, (29)this (30)section (31)does (32)not (33)affect (34)the (35)execution (36)of (37)the (38)WebAssembly (39)program. WASM-MUTATE (40)includes (41)one (42)transformation (43)to (44)edit (45)custom (46)sections. This (47)is (48)illustrated (49)in (50)the (51)following (52)rewriting (53)rule.

Suggestions

custom

delete 'custom' by ''

Happy suggestion

(0)Custom (1)sections (2)in (3)Web-Assembly (4)are (5)used (6)to (7)store (8)metadata, (9)such (10)as (11)the (12)name (13)of (14)the (15)compiler (16)that (17)produces (18)the (19)binary (20)or (21)the (22)symbol (23)information (24)for (25)debugging. Thus, (26)this (27)section (28)does (29)not (30)affect (31)the (32)execution (33)of (34)the (35)WebAssembly (36)program. WASM-MUTATE (37)includes (38)one (39)transformation (40)to (41)edit (42)custom (43)sections. This (44)is (45)illustrated (46)in (47)the (48)following (49)rewriting (50)rule.

(0)Edit (1)custom (2)sections: (3)Custom (4)sections (5)in (6)Web-Assembly (7)are (8)used (9)to (10)store (11)metadata, (12)such (13)as (14)the (15)name (16)of (17)the (18)compiler (19)that (20)produces (21)the (22)binary (23)or (24)the (25)symbol (26)information (27)for (28)debugging. Thus, (29)this (30)section (31)does (32)not (33)affect (34)the (35)execution (36)of (37)the (38)WebAssembly (39)program. WASM-MUTATE (40)includes (41)one (42)transformation (43)to (44)edit (45)custom (46)sections. This (47)is (48)illustrated (49)in (50)the (51)following (52)rewriting (53)rule.

Suggestions

Edit

delete 'Edit' by ''

Happy suggestion

(0)Custom (1)sections (2)in (3)Web-Assembly (4)are (5)used (6)to (7)store (8)metadata, (9)such (10)as (11)the (12)name (13)of (14)the (15)compiler (16)that (17)produces (18)the (19)binary (20)or (21)the (22)symbol (23)information (24)for (25)debugging. Thus, (26)this (27)section (28)does (29)not (30)affect (31)the (32)execution (33)of (34)the (35)WebAssembly (36)program. WASM-MUTATE (37)includes (38)one (39)transformation (40)to (41)edit (42)custom (43)sections. This (44)is (45)illustrated (46)in (47)the (48)following (49)rewriting (50)rule.

(0)Edit (1)custom (2)sections: (3)Custom (4)sections (5)in (6)Web-Assembly (7)are (8)used (9)to (10)store (11)metadata, (12)such (13)as (14)the (15)name (16)of (17)the (18)compiler (19)that (20)produces (21)the (22)binary (23)or (24)the (25)symbol (26)information (27)for (28)debugging. Thus, (29)this (30)section (31)does (32)not (33)affect (34)the (35)execution (36)of (37)the (38)WebAssembly (39)program. WASM-MUTATE (40)includes (41)one (42)transformation (43)to (44)edit (45)custom (46)sections. This (47)is (48)illustrated (49)in (50)the (51)following (52)rewriting (53)rule.

Suggestions

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)6 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)6 (5)of (6)25

Suggestions

  • 25.

i32.const.2

delete 'i32.const.2' by ''

Happy suggestion

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2

Suggestions

?x

replace '?x' by 'i32.const.2.'

Happy suggestion

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2

Suggestions

  • i32.const.2.

i32.mul

replace 'i32.mul' by '?x'

Happy suggestion

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2

Suggestions

  • ?x

RHS

replace 'RHS' by 'i32.mul'

Happy suggestion

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2

Suggestions

  • i32.mul

?x

replace '?x' by 'RHS'

Happy suggestion

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2

Suggestions

  • RHS

insert '' by '?x'

Happy suggestion

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.

(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2

Suggestions

  • ?x

i32.const.8

replace 'i32.const.8' by 'i32.const.'

Happy suggestion

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8

Suggestions

  • i32.const.

i32.const.2

replace 'i32.const.2' by 'i32.const.8'

Happy suggestion

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8

Suggestions

  • i32.const.8

i32.const.3

replace 'i32.const.3' by 'i32.const.2'

Happy suggestion

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8

Suggestions

  • i32.const.2

i32.shl

replace 'i32.shl' by 'i32.mul'

Happy suggestion

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8

Suggestions

  • i32.mul

LHS

replace 'LHS' by 'RHS'

Happy suggestion

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8

Suggestions

  • RHS

i32.const.1

replace 'i32.const.1' by 'i32.const.3'

Happy suggestion

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8

Suggestions

  • i32.const.3

insert '' by 'i32.const.1'

Happy suggestion

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8

Suggestions

  • i32.const.1

insert '' by '?x'

Happy suggestion

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8

Suggestions

  • ?x

insert '' by 'i32.shl'

Happy suggestion

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8

Suggestions

  • i32.shl

insert '' by 'LHS'

Happy suggestion

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.

(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8

Suggestions

  • LHS

Peephole:

delete 'Peephole:' by ''

Happy suggestion

(0)This (1)meta-rule (2)is (3)about (4)rewriting (5)peephole (6)instruction (7)sequences (8)within (9)function (10)bodies, (11)signifying (12)the (13)most (14)granular (15)level (16)of (17)rewriting. We (18)implement (19)125 (20)rewriting (21)rules (22)for (23)this (24)group (25)in (26)WASM-MUTATE. We (27)include (28)rewriting (29)rules (30)that (31)affect (32)the (33)memory (34)of (35)the (36)binary. For (37)example, (38)we (39)include (40)rewriting (41)rules (42)that (43)create (44)random (45)assignments (46)to (47)newly (48)created (49)global (50)variables. For (51)these (52)rules, (53)we (54)incorporate (55)several (56)conditions, (57)denoted (58)by (59)cond (60), (61)to (62)ensure (63)successful (64)replacement. These (65)conditions (66)can (67)be (68)used (69)interchangeably (70)and (71)combined (72)to (73)constrain (74)transformations.

(0)Peephole: (1)This (2)meta-rule (3)is (4)about (5)rewriting (6)peephole (7)instruction (8)sequences (9)within (10)function (11)bodies, (12)signifying (13)the (14)most (15)granular (16)level (17)of (18)rewriting. We (19)implement (20)125 (21)rewriting (22)rules (23)for (24)this (25)group (26)in (27)WASM-MUTATE. We (28)include (29)rewriting (30)rules (31)that (32)affect (33)the (34)memory (35)of (36)the (37)binary. (38)For (39)example, (40)we (41)include (42)rewriting (43)rules (44)that (45)create (46)random (47)assignments (48)to (49)newly (50)created (51)global (52)variables. For (53)these (54)rules, (55)we (56)incorporate (57)several (58)conditions, (59)denoted (60)by (61)cond (62), (63)to (64)ensure (65)successful (66)replacement. These (67)conditions (68)can (69)be (70)used (71)interchangeably (72)and (73)combined (74)to (75)constrain (76)transformations.

Suggestions

insert '' by 'i32.'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • i32.

insert '' by 'LHS'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • LHS

RHS

delete 'RHS' by ''

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

2y

replace '2y' by 'LHS'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • LHS

RHS

replace 'RHS' by '?x'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • ?x

insert '' by 'i32.add'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • i32.add

insert '' by '?y'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • ?y

insert '' by '?x'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • ?x

select

replace 'select' by 'i32.add'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • i32.add

insert '' by 'RHS'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • RHS

insert '' by '2y'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • 2y

insert '' by 'select'

Happy suggestion

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.

(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x

Suggestions

  • select

Unpaired symbol: ‘‘’ seems to be missing

Happy suggestion

We have also incorporated commutative rewriting rules. The following three rules provide examples. As discussed earlier, observe that the subexpressions’ type can be changed to any of the original four primitive WebAssembly data types.

Suggestions

insert '' by '132.const.'

Happy suggestion

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x

Suggestions

  • 132.const.

insert '' by '132.const.-1'

Happy suggestion

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x

Suggestions

  • 132.const.-1

insert '' by '?x'

Happy suggestion

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x

Suggestions

  • ?x

insert '' by 'RHS'

Happy suggestion

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x

Suggestions

  • RHS

insert '' by 'i32.const.-1'

Happy suggestion

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x

Suggestions

  • i32.const.-1

insert '' by 'f32.const.1'

Happy suggestion

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x

Suggestions

  • f32.const.1

insert '' by 'f32.mul'

Happy suggestion

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x

Suggestions

  • f32.mul

insert '' by 'LHS'

Happy suggestion

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x

Suggestions

  • LHS

insert '' by 'i32.or'

Happy suggestion

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.

(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x

Suggestions

  • i32.or

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)7 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)7 (5)of (6)25

Suggestions

  • 25.

WebAssembly

replace 'WebAssembly' by 'WebAssembly.'

Happy suggestion

(0)3.3. E-graphs (1)for (2)WebAssembly.

(0)3.3. E-graphs (1)for (2)WebAssembly

Suggestions

  • WebAssembly.

insert '' by 'of'

Happy suggestion

(0)For (1)example, (2)let (3)us (4)consider (5)one (6)program (7)with (8)a (9)single (10)instruction (11)that (12)returns (13)an (14)integer (15)constant, (16)i64.const (17)@. Let (18)us (19)also (20)assume (21)a (22)single (23)rewriting (24)rule, (25)(x, (26)x (27)i64.or (28)x, (29)x (30)instance (31)of (32)ié64). In (33)this (34)example, (35)the (36)program’s (37)control (38)flow (39)graph (40)contains (41)just (42)one (43)node, (44)representing (45)the (46)unique (47)instruction. The (48)rewriting (49)rule (50)represents (51)the (52)equivalence (53)for (54)performing (55)an (56)or (57)operation (58)with (59)two (60)equal (61)operands. Figure (62)2 (63)displays (64)the (65)final (66)e-graph (67)data (68)structure (69)constructed (70)out (71)of (72)this (73)single (74)program (75)and (76)rewriting (77)rule. We (78)start (79)by (80)adding (81)the (82)unique (83)program (84)instruction (85)i64.const (86)@ (87)as (88)an (89)e-node (90)(depicted (91)by (92)the (93)leftmost (94)solid (95)rectangle (96)node (97)in (98)the (99)figure). Next, (100)we (101)generate (102)e-nodes (103)from (104)the (105)rewriting (106)rule (107)(the (108)rightmost (109)solid (110)rectangle) (111)by (112)introducing (113)a (114)new (115)e-node, (116)ié4.or, (117)and (118)creating (119)edges (120)to (121)the (122)x (123)e-node. Following (124)this, (125)we (126)establish (127)equivalence. The (128)rewriting (129)rule (130)combines (131)the (132)two (133)e-nodes (134)into (135)a (136)single (137)e-class (138)(indicated (139)by (140)the (141)dashed (142)rectangle (143)node (144)in (145)the (146)figure). As (147)a (148)result, (149)we (150)update (151)the (152)edges (153)to (154)point (155)to (156)the (157)x (158)symbol (159)e-class.

(0)For (1)example, (2)let (3)us (4)consider (5)one (6)program (7)with (8)a (9)single (10)instruction (11)that (12)returns (13)an (14)integer (15)constant, (16)i64.const (17)@. Let (18)us (19)also (20)assume (21)a (22)single (23)rewriting (24)rule, (25)(x, (26)x (27)i64.or (28)x, (29)x (30)instanceof (31)ié64). In (32)this (33)example, (34)the (35)program’s (36)control (37)flow (38)graph (39)contains (40)just (41)one (42)node, (43)representing (44)the (45)unique (46)instruction. The (47)rewriting (48)rule (49)represents (50)the (51)equivalence (52)for (53)performing (54)an (55)or (56)operation (57)with (58)two (59)equal (60)operands. (61)Figure (62)2 (63)displays (64)the (65)final (66)e-graph (67)data (68)structure (69)constructed (70)out (71)of (72)this (73)single (74)program (75)and (76)rewriting (77)rule. We (78)start (79)by (80)adding (81)the (82)unique (83)program (84)instruction (85)i64.const (86)@ (87)as (88)an (89)e-node (90)(depicted (91)by (92)the (93)leftmost (94)solid (95)rectangle (96)node (97)in (98)the (99)figure). Next, (100)we (101)generate (102)e-nodes (103)from (104)the (105)rewriting (106)rule (107)(the (108)rightmost (109)solid (110)rectangle) (111)by (112)introducing (113)a (114)new (115)e-node, (116)ié4.or, (117)and (118)creating (119)edges (120)to (121)the (122)x (123)e-node. Following (124)this, (125)we (126)establish (127)equivalence. The (128)rewriting (129)rule (130)combines (131)the (132)two (133)e-nodes (134)into (135)a (136)single (137)e-class (138)(indicated (139)by (140)the (141)dashed (142)rectangle (143)node (144)in (145)the (146)figure). As (147)a (148)result, (149)we (150)update (151)the (152)edges (153)to (154)point (155)to (156)the (157)x (158)symbol (159)e-class.

Suggestions

  • of

instanceof

replace 'instanceof' by 'instance'

Happy suggestion

(0)For (1)example, (2)let (3)us (4)consider (5)one (6)program (7)with (8)a (9)single (10)instruction (11)that (12)returns (13)an (14)integer (15)constant, (16)i64.const (17)@. Let (18)us (19)also (20)assume (21)a (22)single (23)rewriting (24)rule, (25)(x, (26)x (27)i64.or (28)x, (29)x (30)instance (31)of (32)ié64). In (33)this (34)example, (35)the (36)program’s (37)control (38)flow (39)graph (40)contains (41)just (42)one (43)node, (44)representing (45)the (46)unique (47)instruction. The (48)rewriting (49)rule (50)represents (51)the (52)equivalence (53)for (54)performing (55)an (56)or (57)operation (58)with (59)two (60)equal (61)operands. Figure (62)2 (63)displays (64)the (65)final (66)e-graph (67)data (68)structure (69)constructed (70)out (71)of (72)this (73)single (74)program (75)and (76)rewriting (77)rule. We (78)start (79)by (80)adding (81)the (82)unique (83)program (84)instruction (85)i64.const (86)@ (87)as (88)an (89)e-node (90)(depicted (91)by (92)the (93)leftmost (94)solid (95)rectangle (96)node (97)in (98)the (99)figure). Next, (100)we (101)generate (102)e-nodes (103)from (104)the (105)rewriting (106)rule (107)(the (108)rightmost (109)solid (110)rectangle) (111)by (112)introducing (113)a (114)new (115)e-node, (116)ié4.or, (117)and (118)creating (119)edges (120)to (121)the (122)x (123)e-node. Following (124)this, (125)we (126)establish (127)equivalence. The (128)rewriting (129)rule (130)combines (131)the (132)two (133)e-nodes (134)into (135)a (136)single (137)e-class (138)(indicated (139)by (140)the (141)dashed (142)rectangle (143)node (144)in (145)the (146)figure). As (147)a (148)result, (149)we (150)update (151)the (152)edges (153)to (154)point (155)to (156)the (157)x (158)symbol (159)e-class.

(0)For (1)example, (2)let (3)us (4)consider (5)one (6)program (7)with (8)a (9)single (10)instruction (11)that (12)returns (13)an (14)integer (15)constant, (16)i64.const (17)@. Let (18)us (19)also (20)assume (21)a (22)single (23)rewriting (24)rule, (25)(x, (26)x (27)i64.or (28)x, (29)x (30)instanceof (31)ié64). In (32)this (33)example, (34)the (35)program’s (36)control (37)flow (38)graph (39)contains (40)just (41)one (42)node, (43)representing (44)the (45)unique (46)instruction. The (47)rewriting (48)rule (49)represents (50)the (51)equivalence (52)for (53)performing (54)an (55)or (56)operation (57)with (58)two (59)equal (60)operands. (61)Figure (62)2 (63)displays (64)the (65)final (66)e-graph (67)data (68)structure (69)constructed (70)out (71)of (72)this (73)single (74)program (75)and (76)rewriting (77)rule. We (78)start (79)by (80)adding (81)the (82)unique (83)program (84)instruction (85)i64.const (86)@ (87)as (88)an (89)e-node (90)(depicted (91)by (92)the (93)leftmost (94)solid (95)rectangle (96)node (97)in (98)the (99)figure). Next, (100)we (101)generate (102)e-nodes (103)from (104)the (105)rewriting (106)rule (107)(the (108)rightmost (109)solid (110)rectangle) (111)by (112)introducing (113)a (114)new (115)e-node, (116)ié4.or, (117)and (118)creating (119)edges (120)to (121)the (122)x (123)e-node. Following (124)this, (125)we (126)establish (127)equivalence. The (128)rewriting (129)rule (130)combines (131)the (132)two (133)e-nodes (134)into (135)a (136)single (137)e-class (138)(indicated (139)by (140)the (141)dashed (142)rectangle (143)node (144)in (145)the (146)figure). As (147)a (148)result, (149)we (150)update (151)the (152)edges (153)to (154)point (155)to (156)the (157)x (158)symbol (159)e-class.

Suggestions

  • instance

-z

delete '-z' by ''

Happy suggestion

(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y=x (7)-z.

(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y= (7)x (8)-z

Suggestions

x

replace 'x' by '-z.'

Happy suggestion

(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y=x (7)-z.

(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y= (7)x (8)-z

Suggestions

  • -z.

y=

replace 'y=' by 'y=x'

Happy suggestion

(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y=x (7)-z.

(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y= (7)x (8)-z

Suggestions

  • y=x

¥)

replace '¥)' by ').'

Happy suggestion

(0)LHS (1)?x (2)LHS (3)?x (4)RHS (5)i32.add (6)(i132.const (7)z (8)i32. RHS (9)(nop (10)?x) (11)const (12)).

(0)LHS (1)?x (2)LHS (3)?x (4)RHS (5)i32.add (6)(i132.const (7)z (8)i32. (9)RHS (10)(nop (11)?x) (12)const (13)¥)

Suggestions

  • ).

"un-folding”

replace '"un-folding”' by '"unfolding"'

Happy suggestion

(0)As (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extends (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"unfolding" (41)of (42)constants (43)rewriting (44)rule. In (45)the (46)latter (47)case, (48)statically (49)defined (50)constants (51)are (52)substituted (53)by (54)the (55)sum (56)of (57)two (58)numbers. This (59)sum (60)computes (61)the (62)original (63)constant (64)at (65)runtime.

(0)AS (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extend (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"un-folding” (41)of (42)constants (43)rewriting (44)rule. (45)In (46)the (47)latter (48)case, (49)statically (50)defined (51)constants (52)are (53)substituted (54)by (55)the (56)sum (57)of (58)two (59)numbers. This (60)sum (61)computes (62)the (63)original (64)constant (65)at (66)runtime.

Suggestions

  • "unfolding"

extend

replace 'extend' by 'extends'

Happy suggestion

(0)As (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extends (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"unfolding" (41)of (42)constants (43)rewriting (44)rule. In (45)the (46)latter (47)case, (48)statically (49)defined (50)constants (51)are (52)substituted (53)by (54)the (55)sum (56)of (57)two (58)numbers. This (59)sum (60)computes (61)the (62)original (63)constant (64)at (65)runtime.

(0)AS (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extend (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"un-folding” (41)of (42)constants (43)rewriting (44)rule. (45)In (46)the (47)latter (48)case, (49)statically (50)defined (51)constants (52)are (53)substituted (54)by (55)the (56)sum (57)of (58)two (59)numbers. This (60)sum (61)computes (62)the (63)original (64)constant (65)at (66)runtime.

Suggestions

  • extends

AS

replace 'AS' by 'As'

Happy suggestion

(0)As (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extends (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"unfolding" (41)of (42)constants (43)rewriting (44)rule. In (45)the (46)latter (47)case, (48)statically (49)defined (50)constants (51)are (52)substituted (53)by (54)the (55)sum (56)of (57)two (58)numbers. This (59)sum (60)computes (61)the (62)original (63)constant (64)at (65)runtime.

(0)AS (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extend (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"un-folding” (41)of (42)constants (43)rewriting (44)rule. (45)In (46)the (47)latter (48)case, (49)statically (50)defined (51)constants (52)are (53)substituted (54)by (55)the (56)sum (57)of (58)two (59)numbers. This (60)sum (61)computes (62)the (63)original (64)constant (65)at (66)runtime.

Suggestions

  • As

"

Unpaired symbol: ‘"’ seems to be missing

Happy suggestion

AS previously mentioned, our work is built on well-established diversification strategies. In the subsequent rewriting rules, we exemplify the porting of two well-known strategies. The leftmost part illustrates the injection of nop instructions [12]. The rightmost part extend the peephole meta-rule with the "un-folding” of constants rewriting rule. In the latter case, statically defined constants are substituted by the sum of two numbers. This sum computes the original constant at runtime.

Suggestions

insert '' by '4'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

Happy suggestion

(0)Class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4’ (10)4' (11)4''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

(0)class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4

Suggestions

  • 4''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

insert '' by '4''

Happy suggestion

(0)Class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4’ (10)4' (11)4''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

(0)class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4

Suggestions

  • 4'

‘4

replace '‘4' by '‘4’'

Happy suggestion

(0)Class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4’ (10)4' (11)4''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

(0)class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4

Suggestions

  • ‘4’

class

replace 'class' by 'Class'

Happy suggestion

(0)Class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4’ (10)4' (11)4''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

(0)class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4

Suggestions

  • Class

class

This sentence does not start with an uppercase letter.

Happy suggestion

class e-& p Yn Cc Oo oO + wo ‘4

Suggestions

  • Class

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)8 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)8 (5)of (6)25

Suggestions

  • 25.

WASM-MUTATE,

replace 'WASM-MUTATE,' by 'WASM-MUTATE'

Happy suggestion

(0)We (1)propose (2)and (3)implement (4)the (5)following (6)algorithm (7)to (8)randomly (9)traverse (10)an (11)e-graph (12)and (13)generate (14)semantically (15)equivalent (16)program (17)variants, (18)see (19)|. It (20)receives (21)an (22)e-graph, (23)an (24)e-class (25)node (26)(initially (27)the (28)root’s (29)e-class), (30)and (31)the (32)maximum (33)depth (34)of (35)expression (36)to (37)extract. The (38)depth (39)parameter (40)ensures (41)that (42)the (43)algorithm (44)is (45)not (46)stuck (47)in (48)an (49)infinite (50)recursion. We (51)select (52)a (53)random (54)e-node (55)from (56)the (57)e-class (58)(lines (59)5 (60)and (61)6), (62)and (63)the (64)process (65)recursively (66)continues (67)with (68)the (69)children (70)of (71)the (72)selected (73)e-node (74)(line (75)8) (76)with (77)a (78)decreasing (79)depth. As (80)soon (81)as (82)the (83)depth (84)becomes (85)zero, (86)the (87)algorithm (88)returns (89)the (90)smallest (91)expression (92)out (93)of (94)the (95)current (96)e-class (97)(line (98)3). The (99)subexpressions (100)are (101)composed (102)together (103)(line (104)10) (105)for (106)each (107)child, (108)and (109)then (110)the (111)entire (112)expression (113)is (114)returned (115)(line (116)11). To (117)the (118)best (119)of (120)our (121)knowledge, (122)WASM-MUTATE (123)is (124)the (125)first (126)practical (127)implementation (128)of (129)random (130)e-graph (131)traversal (132)for (133)WebAssembly.

(0)We (1)propose (2)and (3)implement (4)the (5)following (6)algorithm (7)to (8)randomly (9)traverse (10)an (11)e-graph (12)and (13)generate (14)semantically (15)equivalent (16)program (17)variants, (18)see (19)|. It (20)receives (21)an (22)e-graph, (23)an (24)e-class (25)node (26)(initially (27)the (28)root’s (29)e-class), (30)and (31)the (32)maximum (33)depth (34)of (35)expression (36)to (37)extract. The (38)depth (39)parameter (40)ensures (41)that (42)the (43)algorithm (44)is (45)not (46)stuck (47)in (48)an (49)infinite (50)recursion. We (51)select (52)a (53)random (54)e-node (55)from (56)the (57)e-class (58)(lines (59)5 (60)and (61)6), (62)and (63)the (64)process (65)recursively (66)continues (67)with (68)the (69)children (70)of (71)the (72)selected (73)e-node (74)(line (75)8) (76)with (77)a (78)decreasing (79)depth. As (80)soon (81)as (82)the (83)depth (84)becomes (85)zero, (86)the (87)algorithm (88)returns (89)the (90)smallest (91)expression (92)out (93)of (94)the (95)current (96)e-class (97)(line (98)3). The (99)subexpressions (100)are (101)composed (102)together (103)(line (104)10) (105)for (106)each (107)child, (108)and (109)then (110)the (111)entire (112)expression (113)is (114)returned (115)(line (116)11). (117)To (118)the (119)best (120)of (121)our (122)knowledge, (123)WASM-MUTATE, (124)is (125)the (126)first (127)practical (128)implementation (129)of (130)random (131)e-graph (132)traversal (133)for (134)WebAssembly.

Suggestions

  • WASM-MUTATE

over

delete 'over' by ''

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

3

delete '3' by ''

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

Listing

delete 'Listing' by ''

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

for

delete 'for' by ''

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

traversal

delete 'traversal' by ''

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

egraph

delete 'egraph' by ''

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

»))

delete '»))' by ''

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

1

delete '1' by ''

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

i64.const

delete 'i64.const' by ''

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

1))

replace '1))' by '1))))'

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

  • 1))))

i64)))

replace 'i64)))' by 'i64))'

Happy suggestion

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.

(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.

Suggestions

  • i64))

expr

delete 'expr' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

return

delete 'return' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

lily

delete 'lily' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

©

delete '©' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

&

delete '&' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

Ee

delete 'Ee' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

Gy

delete 'Gy' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

Oy

delete 'Oy' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

rl

delete 'rl' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

SO

delete 'SO' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

{subexpr}

delete '{subexpr}' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

U

delete 'U' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

expr.operands

delete 'expr.operands' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

<—

delete '<—' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

10:

delete '10:' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

1)

delete '1)' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

depth

delete 'depth' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

child,

delete 'child,' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

graph,

delete 'graph,' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

delete '—' by ''

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

<—

replace '<—' by '—'

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

graph{eclass]

replace 'graph{eclass]' by 'grapheclass]'

Happy suggestion

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—

(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr

Suggestions

  • grapheclass]

]

Unpaired symbol: ‘[’ seems to be missing

Happy suggestion

Algorithm 1 e-graph traversal algorithm. 1: procedure TRAVERSE(e — graph, eclass, depth) 2: if depth = 0 then return smallest_tree_from(e-graph, eclass) else nodes <— e — graph{eclass] node — random_choice(nodes) expr <— (node, operands = []) for each child € node.children do subexpr — TRAVERSE(e — graph, child, depth — 1) 10: expr.operands <— expr.operands U {subexpr} SO rl Oy Gy Ee & © lily return expr

Suggestions

equivalence

delete 'equivalence' by ''

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

semantic

delete 'semantic' by ''

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

the

replace 'the' by 'equivalentity'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • equivalentity

guarantees

replace 'guarantees' by 'semantic'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • semantic

approach

replace 'approach' by 'the'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • the

This

replace 'This' by 'guarantees'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • guarantees

operands.

replace 'operands.' by 'approach'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • approach

their

replace 'their' by 'This'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • This

and

replace 'and' by 'operands.'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • operands.

e-nodes

replace 'e-nodes' by 'their'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • their

to

replace 'to' by 'and'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • and

applied

replace 'applied' by 'e-nodes'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • e-nodes

function

replace 'function' by 'to'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • to

cost

replace 'cost' by 'applied'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • applied

a

replace 'a' by 'function'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • function

through

replace 'through' by 'cost'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • cost

defined

replace 'defined' by 'a'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • a

recursively

replace 'recursively' by 'through'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • through

is

replace 'is' by 'defined'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • defined

process

replace 'process' by 'recursively'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • recursively

extraction

replace 'extraction' by 'is'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • is

the

replace 'the' by 'process'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • process

when

replace 'when' by 'extraction'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • extraction

especially

replace 'especially' by 'the'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • the

flexi-bility,

replace 'flexi-bility,' by 'when'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • when

of

replace 'of' by 'especially'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • especially

level

replace 'level' by 'flexibility,'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • flexibility,

high

replace 'high' by 'of'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • of

a

replace 'a' by 'level'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • level

achieve

replace 'achieve' by 'high'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • high

can

replace 'can' by 'a'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • a

e-graphs

replace 'e-graphs' by 'achieve'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • achieve

from

replace 'from' by 'can'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • can

fragments

replace 'fragments' by 'e-graphs'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • e-graphs

code

replace 'code' by 'from'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • from

of

replace 'of' by 'fragments'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • fragments

extraction

replace 'extraction' by 'code'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • code

the

replace 'the' by 'of'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • of

that

replace 'that' by 'extraction'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • extraction

illustrate

replace 'illustrate' by 'The'

Happy suggestion

(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.

(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.

Suggestions

  • The

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)9 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)9 (5)of (6)25

Suggestions

  • 25.

insert '' by '*https://cra'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • *https://cra

state.

delete 'state.' by ''

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

its

replace 'its' by '*https://crates.io/crates/wasmparser'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • *https://crates.io/crates/wasmparser

collect

replace 'collect' by '*https://crates.io/crates/wasmparser'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • *https://crates.io/crates/wasmparser

to

replace 'to' by '*https://crates.io/crates/wasmparser'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • *https://crates.io/crates/wasmparser

variant

replace 'variant' by '*https://crates.io/crates/wasmparser'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • *https://crates.io/crates/wasmparser

the

replace 'the' by '*https://crates.io/crates/wasmparser'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • *https://crates.io/crates/wasmparser

execute

replace 'execute' by 'state.'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • state.

we

replace 'we' by 'its'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • its

met,

replace 'met,' by 'collect'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • collect

is

replace 'is' by 'to'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • to

condition

replace 'condition' by 'variant'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • variant

this

replace 'this' by 'the'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • the

If

replace 'If' by 'execute'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • execute

level.

replace 'level.' by 'we'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • we

code

replace 'code' by 'met,'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • met,

machine

replace 'machine' by 'is'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • is

the

replace 'the' by 'condition'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • condition

at

replace 'at' by 'this'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • this

diversity

replace 'diversity' by 'If'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • If

confirming

replace 'confirming' by 'level.'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • level.

thus

replace 'thus' by 'code'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • code

original,

replace 'original,' by 'machine'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • machine

from

replace 'from' by 'at'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • at

differs

replace 'differs' by 'diversity'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • diversity

code

replace 'code' by 'confirming'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • confirming

machine

replace 'machine' by 'thus'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • thus

this

replace 'this' by 'original,'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • original,

whether

replace 'whether' by 'the'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • the

checks

replace 'checks' by 'from'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • from

then

replace 'then' by 'differs'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • differs

algorithm

replace 'algorithm' by 'code'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • code

The

replace 'The' by 'machine'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • machine

code.

replace 'code.' by 'this'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • this

machine

replace 'machine' by 'whether'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • whether

into

replace 'into' by 'checks'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • checks

variant

replace 'variant' by 'then'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • then

the

replace 'the' by 'algorithm'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • algorithm

compiles

replace 'compiles' by 'The'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • The

step

replace 'step' by 'code.'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • code.

This

replace 'This' by 'machine'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • machine

engine.

replace 'engine.' by 'into'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • into

WebAssembly

replace 'WebAssembly' by 'variant'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • variant

within

replace 'within' by 'compiles'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • compiles

compilation

replace 'compilation' by 'step'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • step

JIT

replace 'JIT' by 'This'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • This

a

replace 'a' by 'engine.'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • engine.

triggers

replace 'triggers' by 'WebAssembly'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • WebAssembly

11

replace '11' by 'the'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • the

line

replace 'line' by 'within'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • within

variant,

replace 'variant,' by 'compilation'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • compilation

unique

replace 'unique' by 'JIT'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • JIT

insert '' by 'triggers'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • triggers

insert '' by '11'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • 11

insert '' by 'line'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • line

insert '' by 'variant,'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • variant,

insert '' by 'unique'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • unique

insert '' by 'a'

Happy suggestion

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra

(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser

Suggestions

  • a

~.

replace '~.' by '.'

Happy suggestion

(0)We (1)start (2)WASM-MUTATE (3)in (4)line (5)8 (6)of (7)the (8)algorithm, (9)initiating (10)the (11)loop (12)for (13)creating (14)a (15)new (16)variant. If (17)a (18)variant (19)is (20)generated (21)out (22)of (23)WASM-MUTATE (24)in (25)line (26)8, (27)static (28)validation (29)is (30)invoked (31)in (32)line (33)9. This (34)static (35)validation (36)is (37)performed (38)by (39)the (40)wasmtime (41)parser (42). The (43)static (44)validation (45)step (46)ensures (47)the (48)stack’s (49)soundness. For (50)instance, (51)the (52)static (53)validator (54)verifies (55)that (56)a (57)function (58)call (59)does (60)not (61)refer (62)to (63)a (64)non-existent (65)function (66)index. It (67)also (68)ensures (69)the (70)correctness (71)of (72)the (73)execution (74)stack, (75)i.e., (76)a (77)non-returning (78)block (79)should (80)leave (81)the (82)stack (83)in (84)the (85)same (86)state (87)as (88)before (89)execution.

(0)We (1)start (2)WASM-MUTATE (3)in (4)line (5)8 (6)of (7)the (8)algorithm, (9)initiating (10)the (11)loop (12)for (13)creating (14)a (15)new (16)variant. If (17)a (18)variant (19)is (20)generated (21)out (22)of (23)WASM-MUTATE (24)in (25)line (26)8, (27)static (28)validation (29)is (30)invoked (31)in (32)line (33)9. This (34)static (35)validation (36)is (37)performed (38)by (39)the (40)wasmtime (41)parser (42)~. The (43)static (44)validation (45)step (46)ensures (47)the (48)stack’s (49)soundness. For (50)instance, (51)the (52)static (53)validator (54)verifies (55)that (56)a (57)function (58)call (59)does (60)not (61)refer (62)to (63)a (64)non-existent (65)function (66)index. It (67)also (68)ensures (69)the (70)correctness (71)of (72)the (73)execution (74)stack, (75)i.e., (76)a (77)non-returning (78)block (79)should (80)leave (81)the (82)stack (83)in (84)the (85)same (86)state (87)as (88)before (89)execution.

Suggestions

  • .

can

delete 'can' by ''

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

code

delete 'code' by ''

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

WebAssembly

replace 'WebAssembly' by 'be'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • be

original

replace 'original' by 'can'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • can

the

replace 'the' by 'code'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • code

to

replace 'to' by 'WebAssembly'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • WebAssembly

applied

replace 'applied' by 'original'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • original

result

replace 'result' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

traversal

replace 'traversal' by 'to'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • to

The

replace 'The' by 'applied'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • applied

1

replace '1' by 'result'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • result

0)i64.const

replace '0)i64.const' by 'traversal'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • traversal

i64.const

replace 'i64.const' by 'The'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • The

i64.const

delete 'i64.const' by ''

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

(i64.add

delete '(i64.add' by ''

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

i64.or

replace 'i64.or' by '0)i64.const'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • 0)i64.const

=

replace '=' by 'i64.const'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.const

expr

replace 'expr' by '1'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • 1

returning:

replace 'returning:' by 'i64.const'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.const

e-node,

replace 'e-node,' by '(i64.add'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • (i64.add

instruction

replace 'instruction' by 'i64.or'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.or

initial

replace 'initial' by '='

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • =

the

replace 'the' by 'expr'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • expr

to

replace 'to' by 'returning:'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • returning:

corresponding

replace 'corresponding' by 'e-node,'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • e-node,

selected,

replace 'selected,' by 'instruction'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • instruction

is

replace 'is' by 'initial'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • initial

or

replace 'or' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

i64.

replace 'i64.' by 'to'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • to

the

replace 'the' by 'corresponding'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • corresponding

of

replace 'of' by 'selected,'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • selected,

operand

replace 'operand' by 'is'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • is

right

replace 'right' by 'or'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • or

the

replace 'the' by 'i64.'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.

(8),

replace '(8),' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

step

replace 'step' by 'of'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • of

final

replace 'final' by 'operand'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • operand

the

replace 'the' by 'right'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • right

In

replace 'In' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

r.

replace 'r.' by '(8),'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • (8),

@)

replace '@)' by 'step'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • step

i64.const

replace 'i64.const' by 'final'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • final

1

replace '1' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

i64.const

replace 'i64.const' by 'In'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • In

(i64.add

replace '(i64.add' by 'r.'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • r.

i64.or

replace 'i64.or' by '@)'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • @)

=

replace '=' by 'i64.const'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.const

expr

replace 'expr' by '1'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • 1

@:

replace '@:' by 'i64.const'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.const

(6)

replace '(6)' by '(i64.add'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • (i64.add

selected

replace 'selected' by 'i64.or'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.or

1s

replace '1s' by '='

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • =

@

replace '@' by 'expr'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • expr

i64.const

replace 'i64.const' by '@:'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • @:

node

replace 'node' by '(6)'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • (6)

the

replace 'the' by 'selected'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • selected

where

replace 'where' by '1s'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • 1s

e-class,

replace 'e-class,' by '@'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • @

another

replace 'another' by 'i64.const'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.const

to

replace 'to' by 'node'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • node

belongs

replace 'belongs' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

node

replace 'node' by 'where'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • where

add

replace 'add' by 'e-class,'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • e-class,

i64.

replace 'i64.' by 'another'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • another

the

replace 'the' by 'to'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • to

of

replace 'of' by 'belongs'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • belongs

operand

replace 'operand' by 'node'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • node

right

replace 'right' by 'Add'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • Add

The

replace 'The' by 'i64.'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.

r.

replace 'r.' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

r)

replace 'r)' by 'of'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • of

1

replace '1' by 'operation'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • operation

i64.const

replace 'i64.const' by 'right'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • right

(i64.add

replace '(i64.add' by 'The'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • The

i64.0r

replace 'i64.0r' by 'r.'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • r.

=

replace '=' by 'r)'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • r)

expr

replace 'expr' by '1'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • 1

6):

replace '6):' by 'i64.const'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.const

node

replace 'node' by '(i64.add'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • (i64.add

original

replace 'original' by 'i64.0r'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.0r

the

replace 'the' by '='

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • =

is

replace 'is' by 'expr'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • expr

node

replace 'node' by '6):'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • 6):

i¢4.add

replace 'i¢4.add' by 'node'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • node

the

replace 'the' by 'original'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • original

of

replace 'of' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

operand

replace 'operand' by 'is'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • is

left

replace 'left' by 'node'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • node

The

replace 'The' by 'i4.add'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i4.add

r.

replace 'r.' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

1

replace '1' by 'operand'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • operand

(i64.add

replace '(i64.add' by 'left'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • left

i64.or

replace 'i64.or' by 'The'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • The

=

replace '=' by 'r.'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • r.

expr

replace 'expr' by 'r)'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • r)

e-class:

replace 'e-class:' by '1'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • 1

the

replace 'the' by '(i64.add'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • (i64.add

within

replace 'within' by 'i64.or'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.or

node

replace 'node' by '='

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • =

i64.add

replace 'i64.add' by 'expr'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • expr

the

replace 'the' by 'e-class:'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • e-class:

choosing

replace 'choosing' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

GB),

replace 'GB),' by 'within'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • within

selected

replace 'selected' by 'i64.add'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.add

of

delete 'of' by ''

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

operand

replace 'operand' by 'choosing'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • choosing

left

replace 'left' by 'GB),'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • GB),

the

replace 'the' by 'node'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • node

with

replace 'with' by 'selected'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • selected

proceeds

replace 'proceeds' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

traversal

replace 'traversal' by 'of'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • of

The

replace 'The' by 'operand'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • operand

r.

replace 'r.' by 'left'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • left

1

replace '1' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

i64.or

replace 'i64.or' by 'with'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • with

=

replace '=' by 'proceeds'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • proceeds

expr

replace 'expr' by 'traversal'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • traversal

in:

replace 'in:' by 'The'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • The

resulting

replace 'resulting' by 'r.'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • r.

node,

replace 'node,' by '1'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • 1

the

replace 'the' by '='

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • =

case,

replace 'case,' by 'expr'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • expr

this

replace 'this' by 'in:'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • in:

in

replace 'in' by 'resulting'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • resulting

(2),

replace '(2),' by 'node,'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • node,

e-class

replace 'e-class' by 'i64.or'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • i64.or

insert '' by 'case,'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • case,

insert '' by 'this'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • this

insert '' by '(2),'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • (2),

node

replace 'node' by 'e-class'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • e-class

equivalent

replace 'equivalent' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

an

replace 'an' by 'in'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • in

selects

replace 'selects' by 'node'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • node

then

replace 'then' by 'equivalent'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • equivalent

It

replace 'It' by 'an'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • an

3.

replace '3.' by 'selects'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • selects

Listing

replace 'Listing' by 'then'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • then

from

replace 'from' by 'It'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • It

1

replace '1' by '3.'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • 3.

ié4.const

replace 'ié4.const' by 'Listing'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • Listing

instruction

replace 'instruction' by 'from'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • from

single

replace 'single' by '1'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • 1

the

replace 'the' by 'ié4.const'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • ié4.const

containing

replace 'containing' by 'instruction'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • instruction

e-class

replace 'e-class' by 'single'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • single

insert '' by 'containing'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • containing

insert '' by 'e-class'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • e-class

insert '' by 'the'

Happy suggestion

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.

(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.

Suggestions

  • the

loop

replace 'loop' by 'loop.'

Happy suggestion

(0)3.4. WASM-MUTATE (1)in (2)the (3)loop.

(0)3.4. WASM-MUTATE (1)in (2)the (3)loop

Suggestions

  • loop.

insert '' by 'list.'

Happy suggestion

(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.

(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add

Suggestions

  • list.

insert '' by 'the'

Happy suggestion

(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.

(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add

Suggestions

  • the

insert '' by 'to'

Happy suggestion

(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.

(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add

Suggestions

  • to

add

replace 'add' by 'Add'

Happy suggestion

(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.

(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add

Suggestions

  • Add

const

replace 'const' by 'Const'

Happy suggestion

(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.

(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add

Suggestions

  • Const

if

replace 'if' by 'If'

Happy suggestion

(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.

(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add

Suggestions

  • If

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)10 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)10 (5)of (6)25

Suggestions

  • 25.

approximately,

replace 'approximately,' by 'approximately'

Happy suggestion

(0)WASM-MUTATE (1)is (2)implemented (3)in (4)Rust, (5)comprising (6)approximately (7)10000 (8)lines (9)of (10)Rust (11)code. We (12)leverage (13)the (14)capabilities (15)of (16)the (17)wasm-tools (18)project (19)of (20)the (21)bytecode (22)alliance (23)for (24)parsing (25)and (26)transforming (27)WebAssembly (28)binary (29)code. Specifically, (30)we (31)use (32)the (33)wasmparser, (34)https://github.com/bytecodealliance/wasm-tools/ (35)tree/main/crates/wasmparser (36)and (37)wasm-encoder, (38)https://github.com/bytecodealliance/wasm-tools/tree/ (39)main/crates/wasm-encoder (40)modules (41)for (42)parsing (43)and (44)encoding (45)WebAssembly (46)binaries, (47)respectively. The (48)wasmparser (49)crate (50)provides (51)quick, (52)efficient (53)decoding (54)and (55)parsing (56)of (57)WebAssembly (58)binary (59)files. Its (60)primary (61)advantage (62)is (63)a (64)minimal (65)memory (66)footprint, (67)achieved (68)without (69)creating (70)AST (71)or (72)IR (73)of (74)WebAssembly (75)data. Conversely, (76)the (77)wasm-encoder (78)crate (79)is (80)a (81)reliable (82)library (83)for (84)encoding (85)Wasm (86)binaries. Additionally, (87)the (88)wasm-encoder (89)crate (90)offers (91)static (92)validation (93)of (94)the (95)constructed (96)binary, (97)ensuring (98)the (99)integrity (100)of (101)a (102)newly (103)encoded (104)Wasm (105)binary. The (106)implementation (107)of (108)WASM-MUTATE (109)is (110)publicly (111)available (112)for (113)future (114)research (115)and (116)can (117)be (118)found (119)at (120)https://github.com/bytecodealliance/ (121)wasm-tools/tree/main/crates/wasm-mutate.

(0)WASM-MUTATE (1)is (2)implemented (3)in (4)Rust, (5)comprising (6)approximately, (7)10000 (8)lines (9)of (10)Rust (11)code. We (12)leverage (13)the (14)capabilities (15)of (16)the (17)wasm-tools (18)project (19)of (20)the (21)bytecode (22)alliance (23)for (24)parsing (25)and (26)transforming (27)WebAssembly (28)binary (29)code. Specifically, (30)we (31)use (32)the (33)wasmparser, (34)https://github.com/bytecodealliance/wasm-tools/ (35)tree/main/crates/wasmparser (36)and (37)wasm-encoder, (38)https://github.com/bytecodealliance/wasm-tools/tree/ (39)main/crates/wasm-encoder (40)modules (41)for (42)parsing (43)and (44)encoding (45)WebAssembly (46)binaries, (47)respectively. The (48)wasmparser (49)crate (50)provides (51)quick, (52)efficient (53)decoding (54)and (55)parsing (56)of (57)WebAssembly (58)binary (59)files. Its (60)primary (61)advantage (62)is (63)a (64)minimal (65)memory (66)footprint, (67)achieved (68)without (69)creating (70)AST (71)or (72)IR (73)of (74)WebAssembly (75)data. Conversely, (76)the (77)wasm-encoder (78)crate (79)is (80)a (81)reliable (82)library (83)for (84)encoding (85)Wasm (86)binaries. Additionally, (87)the (88)wasm-encoder (89)crate (90)offers (91)static (92)validation (93)of (94)the (95)constructed (96)binary, (97)ensuring (98)the (99)integrity (100)of (101)a (102)newly (103)encoded (104)Wasm (105)binary. The (106)implementation (107)of (108)WASM-MUTATE (109)is (110)publicly (111)available (112)for (113)future (114)research (115)and (116)can (117)be (118)found (119)at (120)https://github.com/bytecodealliance/ (121)wasm-tools/tree/main/crates/wasm-mutate.

Suggestions

  • approximately

insert '' by 'state.'

Happy suggestion

(0)Then, (1)the (2)variant’s (3)state (4)is (5)compared (6)to (7)the (8)original (9)state (10)for (11)dynamic (12)validation. This (13)process (14)is (15)demonstrated (16)in (17)line (18)14. We (19)perform (20)a (21)fine-grained (22)comparison (23)of (24)the (25)variant’s (26)globals, (27)linear (28)memory, (29)and (30)output (31)according (32)to (33)a (34)validation (35)workload. For (36)example, (37)the (38)variant (39)and (40)the (41)original (42)are (43)considered (44)identical (45)for (46)the (47)linear (48)memory (49)if (50)all (51)bytes (52)are (53)equal (54)and (55)in (56)the (57)same (58)order. If (59)there (60)is (61)any (62)difference (63)in (64)these (65)state (66)components, (67)the (68)variant (69)is (70)discarded (71)because (72)it (73)is (74)not (75)equivalent (76)to (77)the (78)oriuginal (79)state.

(0)Then, (1)the (2)variant’s (3)state (4)is (5)compared (6)to (7)the (8)original (9)state (10)for (11)dynamic (12)validation. This (13)process (14)is (15)demonstrated (16)in (17)line (18)14. We (19)perform (20)a (21)fine-grained (22)comparison (23)of (24)the (25)variant’s (26)globals, (27)linear (28)memory, (29)and (30)output (31)according (32)to (33)a (34)validation (35)workload. For (36)example, (37)the (38)variant (39)and (40)the (41)original (42)are (43)considered (44)identical (45)for (46)the (47)linear (48)memory (49)if (50)all (51)bytes (52)are (53)equal (54)and (55)in (56)the (57)same (58)order. If (59)there (60)is (61)any (62)difference (63)in (64)these (65)state (66)components, (67)the (68)variant (69)is (70)discarded (71)because (72)it (73)is (74)not (75)equivalent (76)to (77)the (78)oriugina

Suggestions

  • state.

oriugina

replace 'oriugina' by 'oriuginal'

Happy suggestion

(0)Then, (1)the (2)variant’s (3)state (4)is (5)compared (6)to (7)the (8)original (9)state (10)for (11)dynamic (12)validation. This (13)process (14)is (15)demonstrated (16)in (17)line (18)14. We (19)perform (20)a (21)fine-grained (22)comparison (23)of (24)the (25)variant’s (26)globals, (27)linear (28)memory, (29)and (30)output (31)according (32)to (33)a (34)validation (35)workload. For (36)example, (37)the (38)variant (39)and (40)the (41)original (42)are (43)considered (44)identical (45)for (46)the (47)linear (48)memory (49)if (50)all (51)bytes (52)are (53)equal (54)and (55)in (56)the (57)same (58)order. If (59)there (60)is (61)any (62)difference (63)in (64)these (65)state (66)components, (67)the (68)variant (69)is (70)discarded (71)because (72)it (73)is (74)not (75)equivalent (76)to (77)the (78)oriuginal (79)state.

(0)Then, (1)the (2)variant’s (3)state (4)is (5)compared (6)to (7)the (8)original (9)state (10)for (11)dynamic (12)validation. This (13)process (14)is (15)demonstrated (16)in (17)line (18)14. We (19)perform (20)a (21)fine-grained (22)comparison (23)of (24)the (25)variant’s (26)globals, (27)linear (28)memory, (29)and (30)output (31)according (32)to (33)a (34)validation (35)workload. For (36)example, (37)the (38)variant (39)and (40)the (41)original (42)are (43)considered (44)identical (45)for (46)the (47)linear (48)memory (49)if (50)all (51)bytes (52)are (53)equal (54)and (55)in (56)the (57)same (58)order. If (59)there (60)is (61)any (62)difference (63)in (64)these (65)state (66)components, (67)the (68)variant (69)is (70)discarded (71)because (72)it (73)is (74)not (75)equivalent (76)to (77)the (78)oriugina

Suggestions

  • oriuginal

Implementation

replace 'Implementation' by 'Implementation.'

Happy suggestion

(0)3.5. Implementation.

(0)3.5. Implementation

Suggestions

  • Implementation.

transformation

delete 'transformation' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

the

delete 'the' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

stack

delete 'stack' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

we

delete 'we' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

//

delete '//' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

asm

delete 'asm' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

variantW

delete 'variantW' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

<=

delete '<=' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

wasm

delete 'wasm' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

19:

delete '19:' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

return

delete 'return' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

18:

delete '18:' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

then

delete 'then' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

State.trace

delete 'State.trace' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

original

delete 'original' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

#

delete '#' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

state.trace

delete 'state.trace' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

if

delete 'if' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

i

delete 'i' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

then

delete 'then' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

State.output

delete 'State.output' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

original

delete 'original' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

==

delete '==' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

state.output

delete 'state.output' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

16:

delete '16:' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

&&

delete '&&' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

State.globals

delete 'State.globals' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

state.globals

delete 'state.globals' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

15:

delete '15:' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

State.memory

delete 'State.memory' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

state.memory

delete 'state.memory' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

if

delete 'if' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

14:

delete '14:' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

IT)

delete 'IT)' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

engine.execute(variantJ

delete 'engine.execute(variantJ' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

delete '—' by ''

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

state

replace 'state' by 'engine.execute'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • engine.execute

13:

replace '13:' by '—'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

then

replace 'then' by 'state'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • state

unique

replace 'unique' by '13:'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 13:

is

replace 'is' by 'then'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • then

IT

replace 'IT' by 'unique'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • unique

variantJ

replace 'variantJ' by 'is'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • is

if

replace 'if' by 'IT'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • IT

12:

replace '12:' by 'variantJ'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • variantJ

asm)

replace 'asm)' by 'if'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • if

engine.compile(variantW

replace 'engine.compile(variantW' by '12:'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 12:

<—

replace '<—' by 'asm)'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • asm)

IT

replace 'IT' by 'engine.compile(variantW'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • engine.compile(variantW

variantJ

replace 'variantJ' by '—'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

113

replace '113' by 'IT'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • IT

then

replace 'then' by 'variantJ'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • variantJ

unique

replace 'unique' by '113'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 113

asm

replace 'asm' by 'unique'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • unique

variantW

replace 'variantW' by 'is'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • is

if

replace 'if' by 'asm'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • asm

10:

replace '10:' by 'variantW'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • variantW

then

replace 'then' by 'if'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • if

asm)

replace 'asm)' by '10:'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 10:

Validate(variantW

replace 'Validate(variantW' by 'then'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • then

static

replace 'static' by 'asm)'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • asm)

if

replace 'if' by 'Validate(variantW'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • Validate(variantW

WASM-MUTATE(wasm)

replace 'WASM-MUTATE(wasm)' by 'static'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • static

replace '—' by 'if'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • if

asm

replace 'asm' by 'WASM-MUTATE(wasm)'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • WASM-MUTATE(wasm)

variantW

replace 'variantW' by '—'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

do

replace 'do' by 'asm'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • asm

true

replace 'true' by 'variantW'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • variantW

while

replace 'while' by 'do'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • do

originalWasm

replace 'originalWasm' by 'true'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • true

<

replace '<' by 'while'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • while

wasm

replace 'wasm' by 'originalWasm'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • originalWasm

9

replace '9' by 'wasm'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • wasm

8

replace '8' by '9'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 9

7

replace '7' by '8'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 8

6

replace '6' by '7'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 7

asm)

replace 'asm)' by '6'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 6

engine.execute(originalW

replace 'engine.execute(originalW' by 'asm)'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • asm)

replace '—' by 'engine.execute(originalW'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • engine.execute(originalW

State

replace 'State' by '—'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

original

replace 'original' by 'State'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • State

5

replace '5' by 'original'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • original

4

replace '4' by '5'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 5

3

replace '3' by '4'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 4

Z

replace 'Z' by '3'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 3

1

replace '1' by 'Z'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • Z

variant.

replace 'variant.' by '1'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • 1

WebAssembly

replace 'WebAssembly' by 'variant.'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • variant.

different

replace 'different' by 'WebAssembly'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • WebAssembly

behaviourally

replace 'behaviourally' by 'different'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • different

and

replace 'and' by 'behaviourally'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • behaviourally

unique

replace 'unique' by 'and'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • and

statically

replace 'statically' by 'unique'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • unique

A

replace 'A' by 'statically'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • statically

>

replace '>' by 'A'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • A

Output:

replace 'Output:' by '>'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • >

:

replace ':' by 'Output:'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • Output:

:

replace ':' by 'The'

Happy suggestion

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute

(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation

Suggestions

  • The

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)11 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)11 (5)of (6)25

Suggestions

  • 25.

question

delete 'question' by ''

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

research

replace 'research' by 'question,'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • question,

this

replace 'this' by 'research'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • research

In

replace 'In' by 'this'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • this

issues.

replace 'issues.' by 'In'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • In

security

replace 'security' by 'issues.'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • issues.

prevent

replace 'prevent' by 'security'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • security

to

replace 'to' by 'prevent'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • prevent

option

replace 'option' by 'to'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • to

an

replace 'an' by 'option'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • option

is

replace 'is' by 'an'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • an

Diversification

replace 'Diversification' by 'is'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • is

Soft-ware

replace 'Soft-ware' by 'diversification'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • diversification

programs?

replace 'programs?' by 'Soft-ware'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • Soft-ware

WebAssembly

replace 'WebAssembly' by 'programs?'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • programs?

on

replace 'on' by 'WebAssembly'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • WebAssembly

attacks

replace 'attacks' by 'on'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • on

side-channel

replace 'side-channel' by 'attacks'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • attacks

prevent

replace 'prevent' by 'side-channel'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • side-channel

WASM-MUTATE

replace 'WASM-MUTATE' by 'prevent'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • prevent

does

replace 'does' by 'WASM-MUTATE'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • WASM-MUTATE

extent

replace 'extent' by 'does'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • does

what

replace 'what' by 'extent'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • extent

To

replace 'To' by 'what'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • what

RQ4:

replace 'RQ4:' by 'To'

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).

(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).

Suggestions

  • To

RQ3:

delete 'RQ3:' by ''

Happy suggestion

(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)affect (6)the (7)performance (8)of (9)real-world (10)WebAssembly (11)program (12)variants? (13)This (14)research (15)question (16)evaluates (17)the (18)performance (19)impact (20)of (21)WASM-MUTATE (22)in (23)creating (24)variants (25)from (26)real-world (27)programs. We (28)compare (29)the (30)machine (31)code (32)size (33)and (34)the (35)execution (36)time (37)of (38)the (39)original (40)programs (41)and (42)their (43)variants.

(0)RQ3: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)affect (7)the (8)performance (9)of (10)real-world (11)WebAssembly (12)program (13)variants? (14)This (15)research (16)question (17)evaluates (18)the (19)performance (20)impact (21)of (22)WASM-MUTATE (23)in (24)creating (25)variants (26)from (27)real-world (28)programs. We (29)compare (30)the (31)machine (32)code (33)size (34)and (35)the (36)execution (37)time (38)of (39)the (40)original (41)programs (42)and (43)their (44)variants.

Suggestions

functions

replace 'functions' by 'function'

Happy suggestion

(0)We (1)answer (2)RQI (3)and (4)RQ? (5)with (6)a (7)corpus (8)of (9)programs (10)from (11)Cabrera (12)et.al. [1], (13)which (14)is (15)shown (16)in (17)the (18)first (19)row (20)of (21)Table (22)1. The (23)corpus (24)contains (25)303 (26)programs. The (27)programs (28)in (29)the (30)corpus (31)perform (32)a (33)range (34)of (35)tasks, (36)from (37)simple (38)ones, (39)such (40)as (41)sorting, (42)to (43)complex (44)algorithms (45)like (46)a (47)compiler (48)lexer. The (49)number (50)of (51)total (52)instructions (53)ranges (54)from (55)170 (56)to (57)36023 (58)with (59)a (60)mean (61)of (62)8451 (63)instructions. All (64)programs (65)in (66)the (67)corpus: (68)1) (69)do (70)not (71)require (72)input (73)from (74)users, (75)i.e., (76)do (77)not (78)function (79)like (80)scanf, (81)2) (82)terminate, (83)3) (84)are (85)deterministic, (86)i.e., (87)given (88)the (89)same (90)input, (91)provide (92)the (93)same (94)output (95)and (96)4) (97)compile (98)to (99)WebAssembly (100)using (101)wasi-clang (102)to (103)compile (104)them. The (105)size (106)of (107)the (108)binaries (109)ranges (110)from (111)465 (112)to (113)92114 (114)bytes.

(0)We (1)answer (2)RQI (3)and (4)RQ? (5)with (6)a (7)corpus (8)of (9)programs (10)from (11)Cabrera (12)et.al. [1], (13)which (14)is (15)shown (16)in (17)the (18)first (19)row (20)of (21)Table (22)1. The (23)corpus (24)contains (25)303 (26)programs. The (27)programs (28)in (29)the (30)corpus (31)perform (32)a (33)range (34)of (35)tasks, (36)from (37)simple (38)ones, (39)such (40)as (41)sorting, (42)to (43)complex (44)algorithms (45)like (46)a (47)compiler (48)lexer. The (49)number (50)of (51)total (52)instructions (53)ranges (54)from (55)170 (56)to (57)36023 (58)with (59)a (60)mean (61)of (62)8451 (63)instructions. All (64)programs (65)in (66)the (67)corpus: (68)1) (69)do (70)not (71)require (72)input (73)from (74)users, (75)i.e., (76)do (77)not (78)functions (79)like (80)scanf, (81)2) (82)terminate, (83)3) (84)are (85)deterministic, (86)i.e., (87)given (88)the (89)same (90)input, (91)provide (92)the (93)same (94)output (95)and (96)4) (97)compile (98)to (99)WebAssembly (100)using (101)wasi-clang (102)to (103)compile (104)them. (105)The (106)size (107)of (108)the (109)binaries (110)ranges (111)from (112)465 (113)to (114)92114 (115)bytes.

Suggestions

  • function

contains

You should probably use “contain”.

Happy suggestion

We use a collection of programs comprised of four curated corpora to address our research questions. Our corpora contains a total of 441 programs (303 + 134 + 2 + 2). The metadata of these programs is summarized in Table 1. Each row in the table corresponds to the programs in use for each research question. The columns provide information on the following: the corpus source, the number of programs, the research question addressed, and the mean number of instructions for the programs. Additionally, a short note highlights the main property of the programs in the last column. For instance, the notes in the last two rows indicate the attacks to which the programs are susceptible.

Suggestions

  • contain

insert '' by 'Corpor'

Happy suggestion

(0)4.1. Corpora (1)Corpora (2)Corpora (3)Corpora (4)Corpora (5)Corpora (6)Corpora (7)Corpora (8)Corpora (9)Corpora (10)Corpora (11)Corpora (12)Corpora (13)Corpora (14)Corpora (15)Corpora (16)Corpora (17)Corpora (18)Corpora (19)Corpora (20)Corpora (21)Corpora (22)Corpora (23)Corpora (24)Corpora (25)Corpora (26)Corpora (27)Corpora (28)Corpora (29)Corpora (30)Corpora (31)Corpora (32)Corpora (33)Corpora (34)Corpora (35)Corpora (36)Corpora (37)Corpor

(0)4.1. Corpora

Suggestions

  • Corpor

insert '' by 'Corpora'

Happy suggestion

(0)4.1. Corpora (1)Corpora (2)Corpora (3)Corpora (4)Corpora (5)Corpora (6)Corpora (7)Corpora (8)Corpora (9)Corpora (10)Corpora (11)Corpora (12)Corpora (13)Corpora (14)Corpora (15)Corpora (16)Corpora (17)Corpora (18)Corpora (19)Corpora (20)Corpora (21)Corpora (22)Corpora (23)Corpora (24)Corpora (25)Corpora (26)Corpora (27)Corpora (28)Corpora (29)Corpora (30)Corpora (31)Corpora (32)Corpora (33)Corpora (34)Corpora (35)Corpora (36)Corpora (37)Corpor

(0)4.1. Corpora

Suggestions

  • Corpora

RQ1:

delete 'RQ1:' by ''

Happy suggestion

(0)To (1)what (2)extent (3)are (4)the (5)program (6)variants (7)generated (8)by (9)WASM-MUTATE (10)statically (11)different (12)from (13)the (14)original (15)programs? (16)We (17)check (18)whether (19)the (20)Web-Assembly (21)binary (22)variants (23)rapidly (24)produced (25)by (26)WASM-MUTATE (27)are (28)different (29)from (30)the (31)original (32)WebAssembly (33)binary. Then, (34)we (35)assess (36)whether (37)the (38)x86 (39)machine (40)code (41)produced (42)by (43)the (44)wasmtime (45)engine (46)is (47)also (48)different.

(0)RQ1: (1)To (2)what (3)extent (4)are (5)the (6)program (7)variants (8)generated (9)by (10)WASM-MUTATE (11)statically (12)different (13)from (14)the (15)original (16)programs? (17)We (18)check (19)whether (20)the (21)Web-Assembly (22)binary (23)variants (24)rapidly (25)produced (26)by (27)WASM-MUTATE (28)are (29)different (30)from (31)the (32)original (33)WebAssembly (34)binary. Then, (35)we (36)assess (37)whether (38)the (39)x86 (40)machine (41)code (42)produced (43)by (44)the (45)wasmtime (46)engine (47)is (48)also (49)different.

Suggestions

F4s-v2(Skylake)

replace 'F4s-v2(Skylake)' by '(Skylake)'

Happy suggestion

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

Suggestions

  • (Skylake)

Standard

replace 'Standard' by 'F4s-v2'

Happy suggestion

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

Suggestions

  • F4s-v2

in

replace 'in' by 'Standard'

Happy suggestion

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

Suggestions

  • Standard

conducted

replace 'conducted' by 'in'

Happy suggestion

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

Suggestions

  • in

are

replace 'are' by 'conducted'

Happy suggestion

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

Suggestions

  • conducted

experiments

replace 'experiments' by 'are'

Happy suggestion

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

Suggestions

  • are

Our

replace 'Our' by 'experiments'

Happy suggestion

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

Suggestions

  • experiments

tawasco.

replace 'tawasco.' by 'Our'

Happy suggestion

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

Suggestions

  • Our

https://github.com/ASSERT-KTH/

replace 'https://github.com/ASSERT-KTH/' by 'https://github.com/ASSERT-KTH/tawasco.'

Happy suggestion

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

Suggestions

  • https://github.com/ASSERT-KTH/tawasco.

evalu-ating

replace 'evalu-ating' by 'evaluating'

Happy suggestion

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.

Suggestions

  • evaluating

8GiB

Insert a space between the numerical value and the unit symbol.

Happy suggestion

In this section, we outline our methodology for evalu-ating WASM-MUTATE. Initially, we introduce our research questions and the corpora of programs that we use for the assessment of WASM-MUTATE. Next, we elaborate on the methodology for each research question. For the sake of reproducibility, our data and experimenting pipeline are publicly available at https://github.com/ASSERT-KTH/ tawasco. Our experiments are conducted in Standard F4s-v2(Skylake) Azure machines with 4 virtual CPUs and 8GiB memory per instance.

Suggestions

  • 8 GiB

Evaluation

replace 'Evaluation' by 'Evaluation.'

Happy suggestion

(0)4. Evaluation.

(0)4. Evaluation

Suggestions

  • Evaluation.

PHT

replace 'PHT' by 'PHT.'

Happy suggestion

(0)Source (1)Programs (2)| (3)RQ (4)Mean (5)# (6)Ins. Note (7)CROW (8)[1] (9)| (10)303 (11)prog. | (12)RQ1, (13)8451 (14)Rosetta (15)RQ2 (16)wasmbench (17)| (18)134 (19)prog. | (20)RQ3 (21)12665 (22)Real (23)world (24)[25] (25)Swivel (26)[38] (27)| (28)2 (29)prog. RQ4 (30)297;743 (31)Spectre (32)BTB (33)Safeside (34)2 (35)prog. RQ4 (36)378894;379058 (37)| (38)Spectre (39)RSB (40)[38, (41)22] (42)& (43)Spectre (44)PHT.

(0)Source (1)Programs (2)| (3)RQ (4)Mean (5)# (6)Ins. Note (7)CROW (8)[1] (9)| (10)303 (11)prog. | (12)RQ1, (13)8451 (14)Rosetta (15)RQ2 (16)wasmbench (17)| (18)134 (19)prog. | (20)RQ3 (21)12665 (22)Real (23)world (24)[25] (25)Swivel (26)[38] (27)| (28)2 (29)prog. RQ4 (30)297;743 (31)Spectre (32)BTB (33)Safeside (34)2 (35)prog. RQ4 (36)378894;379058 (37)| (38)Spectre (39)RSB (40)[38, (41)22] (42)& (43)Spectre (44)PHT

Suggestions

  • PHT.

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)12 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)12 (5)of (6)25

Suggestions

  • 25.

V

replace 'V' by 'V.'

Happy suggestion

(0)| (1)set( (2)sha256(v),...sha256(v (3)y))| (4)Vo; (5)€ (6)V.

(0)| (1)set({ (2)sha256(v}),...sha256(v (3)y)})| (4)Vo; (5)€ (6)V

Suggestions

  • V.

y)})|

replace 'y)})|' by 'y))|'

Happy suggestion

(0)| (1)set( (2)sha256(v),...sha256(v (3)y))| (4)Vo; (5)€ (6)V.

(0)| (1)set({ (2)sha256(v}),...sha256(v (3)y)})| (4)Vo; (5)€ (6)V

Suggestions

  • y))|

sha256(v}),...sha256(v

replace 'sha256(v}),...sha256(v' by 'sha256(v),...sha256(v'

Happy suggestion

(0)| (1)set( (2)sha256(v),...sha256(v (3)y))| (4)Vo; (5)€ (6)V.

(0)| (1)set({ (2)sha256(v}),...sha256(v (3)y)})| (4)Vo; (5)€ (6)V

Suggestions

  • sha256(v),...sha256(v

set({

replace 'set({' by 'set('

Happy suggestion

(0)| (1)set( (2)sha256(v),...sha256(v (3)y))| (4)Vo; (5)€ (6)V.

(0)| (1)set({ (2)sha256(v}),...sha256(v (3)y)})| (4)Vo; (5)€ (6)V

Suggestions

  • set(

{vj,U9,...,Uy}

delete '{vj,U9,...,Uy}' by ''

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

=

replace '=' by 'vj,U9,...,Uy'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • vj,U9,...,Uy

V

replace 'V' by '='

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • =

programs

replace 'programs' by 'V'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • V

WebAssembly

replace 'WebAssembly' by 'programs'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • programs

of

replace 'of' by 'WebAssembly'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • WebAssembly

corpus

replace 'corpus' by 'of'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • of

generated

replace 'generated' by 'corpus'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • corpus

a

replace 'a' by 'generated'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • generated

P,

replace 'P,' by 'a'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • a

program

replace 'program' by 'P,'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • P,

Web-Assembly

replace 'Web-Assembly' by 'program'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • program

original

replace 'original' by 'Web-Assembly'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • Web-Assembly

an

replace 'an' by 'original'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • original

Given

replace 'Given' by 'an'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • an

Population_size(P):

replace 'Population_size(P):' by 'Given'

Happy suggestion

(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:

(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:

Suggestions

  • Given

,Uy

Put a space after the comma.

Happy suggestion

Metric 1. Population_size(P): Given an original Web-Assembly program P, a generated corpus of WebAssembly programs V = {vj,U9,...,Uy} where vu; is a variant of P, the population size is defined as:

Suggestions

  • , Uy

mutations

replace 'mutations' by 'mutations.'

Happy suggestion

(0)With (1)RQI1, (2)we (3)assess (4)the (5)ability (6)of (7)WASM-MUTATE (8)to (9)generate (10)WebAssembly (11)variants (12)that (13)are (14)statically (15)different (16)from (17)the (18)original (19)program, (20)including (21)after (22)their (23)compilation (24)to (25)x86 (26)machine (27)code. In (28)Figure (29)4, (30)we (31)show (32)the (33)steps (34)we (35)follow (36)to (37)answer (38)RQ]. We (39)run (40)WASM-MUTATE (41)on (42)the (43)corpus (44)of (45)303 (46)original (47)C (48)programs (49)described (50)in (51)the (52)first (53)row (54)of (55)Table (56)| (57)(step (58)qa) (59)in (60)figure). To (61)generate (62)the (63)variants: (64)1) (65)we (66)start (67)with (68)one (69)original (70)program (71)and (72)pass (73)it (74)to (75)WASM-MUTATE (76)to (77)generate (78)a (79)variant; (80)2) (81)the (82)variants (83)and (84)the (85)original (86)program (87)form (88)a (89)population (90)of (91)variants; (92)3) (93)we (94)randomly (95)select (96)a (97)program (98)from (99)this (100)population (101)and (102)pass (103)it (104)to (105)WASM-MUTATE (106)to (107)generate (108)another (109)variant, (110)which (111)we (112)add (113)to (114)the (115)population; (116)4) (117)we (118)then (119)restart (120)the (121)process (122)in (123)the (124)previous (125)step (126)to (127)stack (128)more (129)mutations. (130)This (131)procedure (132)is (133)carried (134)out (135)for (136)1 (137)hour. The (138)outcome (139)(step (140)(2) (141)in (142)the (143)figure) (144)is (145)a (146)population (147)containing (148)programs (149)with (150)many (151)stacked (152)transformations, (153)all (154)starting (155)from (156)an (157)original (158)WebAssembly (159)program. We (160)then (161)count (162)the (163)number (164)of (165)unique (166)variants (167)in (168)the (169)population. We (170)compute (171)the (172)sha256 (173)hash (174)of (175)each (176)variant (177)bytestream (178)in (179)order (180)to (181)calculate (182)the (183)population (184)size. We (185)define (186)the (187)population (188)size (189)metric (190)as:

(0)With (1)RQI1, (2)we (3)assess (4)the (5)ability (6)of (7)WASM-MUTATE (8)to (9)generate (10)WebAssembly (11)variants (12)that (13)are (14)statically (15)different (16)from (17)the (18)original (19)program, (20)including (21)after (22)their (23)compilation (24)to (25)x86 (26)machine (27)code. In (28)Figure (29)4 (30)we (31)show (32)the (33)steps (34)we (35)follow (36)to (37)answer (38)RQ]. We (39)run (40)WASM-MUTATE (41)on (42)the (43)corpus (44)of (45)303 (46)original (47)C (48)programs (49)described (50)in (51)the (52)first (53)row (54)of (55)Table (56)| (57)(step (58)qa) (59)in (60)figure). To (61)generate (62)the (63)variants: (64)1) (65)we (66)start (67)with (68)one (69)original (70)program (71)and (72)pass (73)it (74)to (75)WASM-MUTATE (76)to (77)generate (78)a (79)variant; (80)2) (81)the (82)variants (83)and (84)the (85)original (86)program (87)form (88)a (89)population (90)of (91)variants; (92)3) (93)we (94)randomly (95)select (96)a (97)program (98)from (99)this (100)population (101)and (102)pass (103)it (104)to (105)WASM-MUTATE (106)to (107)generate (108)another (109)variant, (110)which (111)we (112)add (113)to (114)the (115)population; (116)4) (117)we (118)then (119)restart (120)the (121)process (122)in (123)the (124)previous (125)step (126)to (127)stack (128)more (129)mutations (130)This (131)procedure (132)is (133)carried (134)out (135)for (136)1 (137)hour. The (138)outcome (139)(step (140)(2) (141)in (142)the (143)figure) (144)is (145)a (146)population (147)containing (148)programs (149)with (150)many (151)stacked (152)transformations, (153)all (154)starting (155)from (156)an (157)original (158)WebAssembly (159)program. We (160)then (161)count (162)the (163)number (164)of (165)unique (166)variants (167)in (168)the (169)population. We (170)compute (171)the (172)sha256 (173)hash (174)of (175)each (176)variant (177)bytestream (178)in (179)order (180)to (181)calculate (182)the (183)population (184)size. We (185)define (186)the (187)population (188)size (189)metric (190)as:

Suggestions

  • mutations.

4

replace '4' by '4,'

Happy suggestion

(0)With (1)RQI1, (2)we (3)assess (4)the (5)ability (6)of (7)WASM-MUTATE (8)to (9)generate (10)WebAssembly (11)variants (12)that (13)are (14)statically (15)different (16)from (17)the (18)original (19)program, (20)including (21)after (22)their (23)compilation (24)to (25)x86 (26)machine (27)code. In (28)Figure (29)4, (30)we (31)show (32)the (33)steps (34)we (35)follow (36)to (37)answer (38)RQ]. We (39)run (40)WASM-MUTATE (41)on (42)the (43)corpus (44)of (45)303 (46)original (47)C (48)programs (49)described (50)in (51)the (52)first (53)row (54)of (55)Table (56)| (57)(step (58)qa) (59)in (60)figure). To (61)generate (62)the (63)variants: (64)1) (65)we (66)start (67)with (68)one (69)original (70)program (71)and (72)pass (73)it (74)to (75)WASM-MUTATE (76)to (77)generate (78)a (79)variant; (80)2) (81)the (82)variants (83)and (84)the (85)original (86)program (87)form (88)a (89)population (90)of (91)variants; (92)3) (93)we (94)randomly (95)select (96)a (97)program (98)from (99)this (100)population (101)and (102)pass (103)it (104)to (105)WASM-MUTATE (106)to (107)generate (108)another (109)variant, (110)which (111)we (112)add (113)to (114)the (115)population; (116)4) (117)we (118)then (119)restart (120)the (121)process (122)in (123)the (124)previous (125)step (126)to (127)stack (128)more (129)mutations. (130)This (131)procedure (132)is (133)carried (134)out (135)for (136)1 (137)hour. The (138)outcome (139)(step (140)(2) (141)in (142)the (143)figure) (144)is (145)a (146)population (147)containing (148)programs (149)with (150)many (151)stacked (152)transformations, (153)all (154)starting (155)from (156)an (157)original (158)WebAssembly (159)program. We (160)then (161)count (162)the (163)number (164)of (165)unique (166)variants (167)in (168)the (169)population. We (170)compute (171)the (172)sha256 (173)hash (174)of (175)each (176)variant (177)bytestream (178)in (179)order (180)to (181)calculate (182)the (183)population (184)size. We (185)define (186)the (187)population (188)size (189)metric (190)as:

(0)With (1)RQI1, (2)we (3)assess (4)the (5)ability (6)of (7)WASM-MUTATE (8)to (9)generate (10)WebAssembly (11)variants (12)that (13)are (14)statically (15)different (16)from (17)the (18)original (19)program, (20)including (21)after (22)their (23)compilation (24)to (25)x86 (26)machine (27)code. In (28)Figure (29)4 (30)we (31)show (32)the (33)steps (34)we (35)follow (36)to (37)answer (38)RQ]. We (39)run (40)WASM-MUTATE (41)on (42)the (43)corpus (44)of (45)303 (46)original (47)C (48)programs (49)described (50)in (51)the (52)first (53)row (54)of (55)Table (56)| (57)(step (58)qa) (59)in (60)figure). To (61)generate (62)the (63)variants: (64)1) (65)we (66)start (67)with (68)one (69)original (70)program (71)and (72)pass (73)it (74)to (75)WASM-MUTATE (76)to (77)generate (78)a (79)variant; (80)2) (81)the (82)variants (83)and (84)the (85)original (86)program (87)form (88)a (89)population (90)of (91)variants; (92)3) (93)we (94)randomly (95)select (96)a (97)program (98)from (99)this (100)population (101)and (102)pass (103)it (104)to (105)WASM-MUTATE (106)to (107)generate (108)another (109)variant, (110)which (111)we (112)add (113)to (114)the (115)population; (116)4) (117)we (118)then (119)restart (120)the (121)process (122)in (123)the (124)previous (125)step (126)to (127)stack (128)more (129)mutations (130)This (131)procedure (132)is (133)carried (134)out (135)for (136)1 (137)hour. The (138)outcome (139)(step (140)(2) (141)in (142)the (143)figure) (144)is (145)a (146)population (147)containing (148)programs (149)with (150)many (151)stacked (152)transformations, (153)all (154)starting (155)from (156)an (157)original (158)WebAssembly (159)program. We (160)then (161)count (162)the (163)number (164)of (165)unique (166)variants (167)in (168)the (169)population. We (170)compute (171)the (172)sha256 (173)hash (174)of (175)each (176)variant (177)bytestream (178)in (179)order (180)to (181)calculate (182)the (183)population (184)size. We (185)define (186)the (187)population (188)size (189)metric (190)as:

Suggestions

  • 4,

]

Unpaired symbol: ‘[’ seems to be missing

Happy suggestion

With RQI1, we assess the ability of WASM-MUTATE to generate WebAssembly variants that are statically different from the original program, including after their compilation to x86 machine code. In Figure 4 we show the steps we follow to answer RQ]. We run WASM-MUTATE on the corpus of 303 original C programs described in the first row of Table | (step qa) in figure). To generate the variants: 1) we start with one original program and pass it to WASM-MUTATE to generate a variant; 2) the variants and the original program form a population of variants; 3) we randomly select a program from this population and pass it to WASM-MUTATE to generate another variant, which we add to the population; 4) we then restart the process in the previous step to stack more mutations This procedure is carried out for 1 hour. The outcome (step (2) in the figure) is a population containing programs with many stacked transformations, all starting from an original WebAssembly program. We then count the number of unique variants in the population. We compute the sha256 hash of each variant bytestream in order to calculate the population size. We define the population size metric as:

Suggestions

RQ1

replace 'RQ1' by 'R'

Happy suggestion

(0)4.2. Protocol (1)for (2)RQ1 (3)Protocol (4)for (5)RQ1 (6)Protocol (7)for (8)RQ1 (9)Protocol (10)for (11)RQ1 (12)Protocol (13)for (14)RQ1 (15)Protocol (16)for (17)RQ1 (18)Protocol (19)for (20)RQ1 (21)Protocol (22)for (23)RQ1 (24)Protocol (25)for (26)RQ1 (27)Protocol (28)for (29)RQ1 (30)Protocol (31)for (32)RQ1 (33)Protocol (34)for (35)RQ1 (36)Protocol (37)for (38)RQ1 (39)Protocol (40)for (41)RQ1 (42)Protocol (43)for (44)RQ1 (45)Protocol (46)for (47)RQ1 (48)Protocol (49)for (50)RQ1 (51)Protocol (52)for (53)RQ1 (54)Protocol (55)for (56)RQ1 (57)Protocol (58)for (59)RQ1 (60)Protocol (61)for (62)RQ1 (63)Protocol (64)for (65)RQ1 (66)Protocol (67)for (68)R

(0)4.2. Protocol (1)for (2)RQ1

Suggestions

  • R

insert '' by 'RQ1'

Happy suggestion

(0)4.2. Protocol (1)for (2)RQ1 (3)Protocol (4)for (5)RQ1 (6)Protocol (7)for (8)RQ1 (9)Protocol (10)for (11)RQ1 (12)Protocol (13)for (14)RQ1 (15)Protocol (16)for (17)RQ1 (18)Protocol (19)for (20)RQ1 (21)Protocol (22)for (23)RQ1 (24)Protocol (25)for (26)RQ1 (27)Protocol (28)for (29)RQ1 (30)Protocol (31)for (32)RQ1 (33)Protocol (34)for (35)RQ1 (36)Protocol (37)for (38)RQ1 (39)Protocol (40)for (41)RQ1 (42)Protocol (43)for (44)RQ1 (45)Protocol (46)for (47)RQ1 (48)Protocol (49)for (50)RQ1 (51)Protocol (52)for (53)RQ1 (54)Protocol (55)for (56)RQ1 (57)Protocol (58)for (59)RQ1 (60)Protocol (61)for (62)RQ1 (63)Protocol (64)for (65)RQ1 (66)Protocol (67)for (68)R

(0)4.2. Protocol (1)for (2)RQ1

Suggestions

  • RQ1

insert '' by 'for'

Happy suggestion

(0)4.2. Protocol (1)for (2)RQ1 (3)Protocol (4)for (5)RQ1 (6)Protocol (7)for (8)RQ1 (9)Protocol (10)for (11)RQ1 (12)Protocol (13)for (14)RQ1 (15)Protocol (16)for (17)RQ1 (18)Protocol (19)for (20)RQ1 (21)Protocol (22)for (23)RQ1 (24)Protocol (25)for (26)RQ1 (27)Protocol (28)for (29)RQ1 (30)Protocol (31)for (32)RQ1 (33)Protocol (34)for (35)RQ1 (36)Protocol (37)for (38)RQ1 (39)Protocol (40)for (41)RQ1 (42)Protocol (43)for (44)RQ1 (45)Protocol (46)for (47)RQ1 (48)Protocol (49)for (50)RQ1 (51)Protocol (52)for (53)RQ1 (54)Protocol (55)for (56)RQ1 (57)Protocol (58)for (59)RQ1 (60)Protocol (61)for (62)RQ1 (63)Protocol (64)for (65)RQ1 (66)Protocol (67)for (68)R

(0)4.2. Protocol (1)for (2)RQ1

Suggestions

  • for

insert '' by 'Protocol'

Happy suggestion

(0)4.2. Protocol (1)for (2)RQ1 (3)Protocol (4)for (5)RQ1 (6)Protocol (7)for (8)RQ1 (9)Protocol (10)for (11)RQ1 (12)Protocol (13)for (14)RQ1 (15)Protocol (16)for (17)RQ1 (18)Protocol (19)for (20)RQ1 (21)Protocol (22)for (23)RQ1 (24)Protocol (25)for (26)RQ1 (27)Protocol (28)for (29)RQ1 (30)Protocol (31)for (32)RQ1 (33)Protocol (34)for (35)RQ1 (36)Protocol (37)for (38)RQ1 (39)Protocol (40)for (41)RQ1 (42)Protocol (43)for (44)RQ1 (45)Protocol (46)for (47)RQ1 (48)Protocol (49)for (50)RQ1 (51)Protocol (52)for (53)RQ1 (54)Protocol (55)for (56)RQ1 (57)Protocol (58)for (59)RQ1 (60)Protocol (61)for (62)RQ1 (63)Protocol (64)for (65)RQ1 (66)Protocol (67)for (68)R

(0)4.2. Protocol (1)for (2)RQ1

Suggestions

  • Protocol

sourcing

replace 'sourcing' by 'sourced'

Happy suggestion

(0)We (1)address (2)RQ4 (3)with (4)four (5)WebAssembly (6)programs (7)and (8)three (9)Spectre (10)attack (11)scenarios (12)sourced (13)from (14)the (15)Swivel (16)and (17)Safeside (18)projects (19)[38, (20)22]. The (21)specifics (22)of (23)these (24)programs (25)are (26)revealed (27)in (28)the (29)final (30)two (31)rows (32)of (33)Table (34)|. The (35)first (36)two (37)programs, (38)containing (39)297 (40)and (41)743 (42)instructions (43)respectively, (44)are (45)intentionally (46)designed (47)for (48)the (49)Spectre (50)branch (51)target (52)attack (53)(BTB). These (54)programs (55)have (56)954 (57)and (58)1910 (59)bytes (60)in (61)size. The (62)last (63)two (64)programs, (65)presented (66)in (67)the (68)final (69)row, (70)are (71)derived (72)from (73)the (74)Safeside (75)project (76)[22]. Unlike (77)the (78)first (79)pair, (80)these (81)programs (82)are (83)substantially (84)larger, (85)containing (86)more (87)than (88)300000 (89)instructions (90)each (91)and (92)having (93)sizes (94)exceeding (95)1500000 (96)bytes. They (97)are (98)used (99)to (100)execute (101)the (102)Spectre (103)Return (104)Stack (105)(RSB) (106)and (107)Spectre (108)Pattern (109)History (110)(PHT) (111)attacks (112)[30]. The (113)significant (114)difference (115)in (116)terms (117)of (118)the (119)number (120)of (121)instructions (122)and (123)sizes (124)of (125)the (126)first (127)two (128)programs (129)and (130)the (131)last (132)pair (133)is (134)due (135)to (136)the (137)contrasting (138)compilation (139)processes (140)used (141)for (142)these (143)WebAssembly (144)binaries. A (145)detailed (146)description (147)of (148)the (149)three (150)attack (151)scenarios (152)is (153)provided (154)in (155)subsection (156)4.5.

(0)We (1)address (2)RQ4 (3)with (4)four (5)WebAssembly (6)programs (7)and (8)three (9)Spectre (10)attack (11)scenarios (12)sourcing (13)from (14)the (15)Swivel (16)and (17)Safeside (18)projects (19)[38, (20)22]. The (21)specifics (22)of (23)these (24)programs (25)are (26)revealed (27)in (28)the (29)final (30)two (31)rows (32)of (33)Table (34)|. The (35)first (36)two (37)programs, (38)containing (39)297 (40)and (41)743 (42)instructions (43)respectively, (44)are (45)intentionally (46)designed (47)for (48)the (49)Spectre (50)branch (51)target (52)attack (53)(BTB). These (54)programs (55)have (56)954 (57)and (58)1910 (59)bytes (60)in (61)size. The (62)last (63)two (64)programs, (65)presented (66)in (67)the (68)final (69)row, (70)are (71)derived (72)from (73)the (74)Safeside (75)project (76)[22]. Unlike (77)the (78)first (79)pair, (80)these (81)programs (82)are (83)substantially (84)larger, (85)containing (86)more (87)than (88)300000 (89)instructions (90)each (91)and (92)having (93)sizes (94)exceeding (95)1500000 (96)bytes. They (97)are (98)used (99)to (100)execute (101)the (102)Spectre (103)Return (104)Stack (105)(RSB) (106)and (107)Spectre (108)Pattern (109)History (110)(PHT) (111)attacks (112)[30]. The (113)significant (114)difference (115)in (116)terms (117)of (118)the (119)number (120)of (121)instructions (122)and (123)sizes (124)of (125)the (126)first (127)two (128)programs (129)and (130)the (131)last (132)pair (133)is (134)due (135)to (136)the (137)contrasting (138)compilation (139)processes (140)used (141)for (142)these (143)WebAssembly (144)binaries. A (145)detailed (146)description (147)of (148)the (149)three (150)attack (151)scenarios (152)is (153)provided (154)in (155)subsection (156)4.5.

Suggestions

  • sourced

insert '' by 'questions.'

Happy suggestion

(0)Figure (1)4: (2)Protocol (3)to (4)answer (5)RQ1 (6)and (7)RQ2 (8)questions.

(0)Figure (1)4: (2)Protocol (3)to (4)answer (5)RQ1 (6)and (7)RQ2

Suggestions

  • questions.

insert '' by 'R'

Happy suggestion

(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R

(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2

Suggestions

  • R

insert '' by 'RQ2'

Happy suggestion

(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R

(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2

Suggestions

  • RQ2

©

replace '©' by 'RQ2'

Happy suggestion

(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R

(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2

Suggestions

  • RQ2

IntelPIN

replace 'IntelPIN' by 'RQ2'

Happy suggestion

(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R

(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2

Suggestions

  • RQ2

trace

replace 'trace' by 'RQ2'

Happy suggestion

(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R

(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2

Suggestions

  • RQ2

Mem

replace 'Mem' by 'IntelPIN'

Happy suggestion

(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R

(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2

Suggestions

  • IntelPIN

insert '' by 'Mem'

Happy suggestion

(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R

(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2

Suggestions

  • Mem

insert '' by 'trace'

Happy suggestion

(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R

(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2

Suggestions

  • trace

wasm-mutate

replace 'wasm-mutate' by 'Wasm-mutate'

Happy suggestion

(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R

(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2

Suggestions

  • Wasm-mutate

wasm-mutate

This sentence does not start with an uppercase letter.

Happy suggestion

wasm-mutate wasmtime cranelift compiler , RQL Ins trace Mem trace IntelPIN © RQ2

Suggestions

  • Wasm-mutate

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)13 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)13 (5)of (6)25

Suggestions

  • 25.

wasmtime.

replace 'wasmtime.' by 'time.'

Happy suggestion

(0)For (1)RQ2, (2)we (3)evaluate (4)how (5)fast (6)WASM-MUTATE (7)can (8)generate (9)variants (10)that (11)offer (12)distinct (13)traces (14)compared (15)with (16)the (17)original (18)program. We (19)start (20)by (21)collecting (22)the (23)traces (24)of (25)the (26)original (27)program (28)when (29)executed (30)in (31)time. While (32)continuously (33)generating (34)variants (35)with (36)randomly (37)stacked (38)transformations, (39)we (40)collect (41)the (42)execution (43)traces (44)of (45)the (46)variants (47)as (48)well. We (49)record (50)the (51)time (52)passed (53)until (54)we (55)generate (56)a (57)variant (58)that (59)offers (60)different (61)execution (62)traces, (63)according (64)to (65)two (66)types (67)of (68)traces: (69)machine (70)code (71)instructions (72)and (73)memory (74)accesses. This (75)process (76)can (77)be (78)seen (79)in (80)the (81)enclosed (82)square (83)of (84)Figure (85)4, (86)annotated (87)with (88)RQ2.

(0)For (1)RQ2, (2)we (3)evaluate (4)how (5)fast (6)WASM-MUTATE (7)can (8)generate (9)variants (10)that (11)offer (12)distinct (13)traces (14)compared (15)with (16)the (17)original (18)program. We (19)start (20)by (21)collecting (22)the (23)traces (24)of (25)the (26)original (27)program (28)when (29)executed (30)in (31)wasmtime. While (32)continuously (33)generating (34)variants (35)with (36)randomly (37)stacked (38)transformations, (39)we (40)collect (41)the (42)execution (43)traces (44)of (45)the (46)variants (47)as (48)well. We (49)record (50)the (51)time (52)passed (53)until (54)we (55)generate (56)a (57)variant (58)that (59)offers (60)different (61)execution (62)traces, (63)according (64)to (65)two (66)types (67)of (68)traces: (69)machine (70)code (71)instructions (72)and (73)memory (74)accesses. This (75)process (76)can (77)be (78)seen (79)in (80)the (81)enclosed (82)square (83)of (84)Figure (85)4, (86)annotated (87)with (88)RQ2.

Suggestions

  • time.

RQ2

replace 'RQ2' by 'R'

Happy suggestion

(0)4.3. Protocol (1)for (2)RQ2 (3)Protocol (4)for (5)RQ2 (6)Protocol (7)for (8)RQ2 (9)Protocol (10)for (11)RQ2 (12)Protocol (13)for (14)RQ2 (15)Protocol (16)for (17)RQ2 (18)Protocol (19)for (20)RQ2 (21)Protocol (22)for (23)RQ2 (24)Protocol (25)for (26)RQ2 (27)Protocol (28)for (29)RQ2 (30)Protocol (31)for (32)RQ2 (33)Protocol (34)for (35)RQ2 (36)Protocol (37)for (38)RQ2 (39)Protocol (40)for (41)RQ2 (42)Protocol (43)for (44)RQ2 (45)Protocol (46)for (47)RQ2 (48)Protocol (49)for (50)RQ2 (51)Protocol (52)for (53)RQ2 (54)Protocol (55)for (56)RQ2 (57)Protocol (58)for (59)RQ2 (60)Protocol (61)for (62)RQ2 (63)Protocol (64)for (65)RQ2 (66)Protocol (67)for (68)R

(0)4.3. Protocol (1)for (2)RQ2

Suggestions

  • R

insert '' by 'RQ2'

Happy suggestion

(0)4.3. Protocol (1)for (2)RQ2 (3)Protocol (4)for (5)RQ2 (6)Protocol (7)for (8)RQ2 (9)Protocol (10)for (11)RQ2 (12)Protocol (13)for (14)RQ2 (15)Protocol (16)for (17)RQ2 (18)Protocol (19)for (20)RQ2 (21)Protocol (22)for (23)RQ2 (24)Protocol (25)for (26)RQ2 (27)Protocol (28)for (29)RQ2 (30)Protocol (31)for (32)RQ2 (33)Protocol (34)for (35)RQ2 (36)Protocol (37)for (38)RQ2 (39)Protocol (40)for (41)RQ2 (42)Protocol (43)for (44)RQ2 (45)Protocol (46)for (47)RQ2 (48)Protocol (49)for (50)RQ2 (51)Protocol (52)for (53)RQ2 (54)Protocol (55)for (56)RQ2 (57)Protocol (58)for (59)RQ2 (60)Protocol (61)for (62)RQ2 (63)Protocol (64)for (65)RQ2 (66)Protocol (67)for (68)R

(0)4.3. Protocol (1)for (2)RQ2

Suggestions

  • RQ2

insert '' by 'for'

Happy suggestion

(0)4.3. Protocol (1)for (2)RQ2 (3)Protocol (4)for (5)RQ2 (6)Protocol (7)for (8)RQ2 (9)Protocol (10)for (11)RQ2 (12)Protocol (13)for (14)RQ2 (15)Protocol (16)for (17)RQ2 (18)Protocol (19)for (20)RQ2 (21)Protocol (22)for (23)RQ2 (24)Protocol (25)for (26)RQ2 (27)Protocol (28)for (29)RQ2 (30)Protocol (31)for (32)RQ2 (33)Protocol (34)for (35)RQ2 (36)Protocol (37)for (38)RQ2 (39)Protocol (40)for (41)RQ2 (42)Protocol (43)for (44)RQ2 (45)Protocol (46)for (47)RQ2 (48)Protocol (49)for (50)RQ2 (51)Protocol (52)for (53)RQ2 (54)Protocol (55)for (56)RQ2 (57)Protocol (58)for (59)RQ2 (60)Protocol (61)for (62)RQ2 (63)Protocol (64)for (65)RQ2 (66)Protocol (67)for (68)R

(0)4.3. Protocol (1)for (2)RQ2

Suggestions

  • for

insert '' by 'Protocol'

Happy suggestion

(0)4.3. Protocol (1)for (2)RQ2 (3)Protocol (4)for (5)RQ2 (6)Protocol (7)for (8)RQ2 (9)Protocol (10)for (11)RQ2 (12)Protocol (13)for (14)RQ2 (15)Protocol (16)for (17)RQ2 (18)Protocol (19)for (20)RQ2 (21)Protocol (22)for (23)RQ2 (24)Protocol (25)for (26)RQ2 (27)Protocol (28)for (29)RQ2 (30)Protocol (31)for (32)RQ2 (33)Protocol (34)for (35)RQ2 (36)Protocol (37)for (38)RQ2 (39)Protocol (40)for (41)RQ2 (42)Protocol (43)for (44)RQ2 (45)Protocol (46)for (47)RQ2 (48)Protocol (49)for (50)RQ2 (51)Protocol (52)for (53)RQ2 (54)Protocol (55)for (56)RQ2 (57)Protocol (58)for (59)RQ2 (60)Protocol (61)for (62)RQ2 (63)Protocol (64)for (65)RQ2 (66)Protocol (67)for (68)R

(0)4.3. Protocol (1)for (2)RQ2

Suggestions

  • Protocol

with

delete 'with' by ''

Happy suggestion

(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).

(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).

Suggestions

T,

delete 'T,' by ''

Happy suggestion

(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).

(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).

Suggestions

trace:

delete 'trace:' by ''

Happy suggestion

(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).

(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).

Suggestions

different

delete 'different' by ''

Happy suggestion

(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).

(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).

Suggestions

until

delete 'until' by ''

Happy suggestion

(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).

(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).

Suggestions

Time

delete 'Time' by ''

Happy suggestion

(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).

(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).

Suggestions

)

Unpaired symbol: ‘(’ seems to be missing

Happy suggestion

Metric 3. Time until different trace: Given an original WebAssembly program P, and its execution trace Ty, the time until a different trace is defined as the time between the diversification process starts and when the variant V is generated with execution trace T, with T, # T).

Suggestions

Algorithm

replace 'Algorithm' by 'algorithm'

Happy suggestion

(0)Note (1)that (2)the (3)protocol (4)described (5)earlier (6)can (7)be (8)mapped (9)to (10)algorithm (11)2. For (12)instance, (13)to (14)measure (15)population (16)size (17)for (18)each (19)tested (20)program, (21)one (22)could (23)measure (24)how (25)often (26)the (27)execution (28)of (29)Algorithm (30)2 (31)reaches (32)line (33)11. Similarly, (34)to (35)assess (36)the (37)level (38)of (39)preservation, (40)one (41)could (42)track (43)the (44)frequency (45)with (46)which (47)the (48)algorithm (49)arrives (50)at (51)line (52)13.

(0)Note (1)that (2)the (3)protocol (4)described (5)earlier (6)can (7)be (8)mapped (9)to (10)Algorithm (11)2. For (12)instance, (13)to (14)measure (15)population (16)size (17)for (18)each (19)tested (20)program, (21)one (22)could (23)measure (24)how (25)often (26)the (27)execution (28)of (29)Algorithm (30)2 (31)reaches (32)line (33)11. Similarly, (34)to (35)assess (36)the (37)level (38)of (39)preservation, (40)one (41)could (42)track (43)the (44)frequency (45)with (46)which (47)the (48)algorithm (49)arrives (50)at (51)line (52)13.

Suggestions

  • algorithm

]

Unpaired symbol: ‘[’ seems to be missing

Happy suggestion

[CI] mov rdx, qword ptr [r14+0x100] CI] mov dword ptr [rdx+xe64], ecx Listing 6: Instructions trace with two events out of IntelPIN for the execution of a WebAssembly program with wasmtime. Each event records the corresponding machine code that executes.

Suggestions

sha256(C(P,)))

replace 'sha256(C(P,)))' by 'sha256(C(P,))'

Happy suggestion

(0)If (1)sha256(P,) (2)# (3)sha256(P,) (4)and (5)sha256(C(P,)) (6)# (7)sha256(C(P;)), (8)this (9)means (10)that (11)both (12)programs (13)are (14)still (15)different (16)after (17)being (18)compiled (19)to (20)machine (21)code, (22)and (23)this (24)means (25)that (26)the (27)Cranelift (28)compiler (29)has (30)not (31)removed (32)the (33)transformations (34)made (35)by (36)WASM-MUTATE.

(0)If (1)sha256(P,) (2)# (3)sha256(P,) (4)and (5)sha256(C(P,))) (6)# (7)sha256(C(P;)), (8)this (9)means (10)that (11)both (12)programs (13)are (14)still (15)different (16)after (17)being (18)compiled (19)to (20)machine (21)code, (22)and (23)this (24)means (25)that (26)the (27)Cranelift (28)compiler (29)has (30)not (31)removed (32)the (33)transformations (34)made (35)by (36)WASM-MUTATE.

Suggestions

  • sha256(C(P,))

,)

Put a space after the comma.

Happy suggestion

If sha256(P,) # sha256(P,) and sha256(C(P,))) # sha256(C(P;)), this means that both programs are still different after being compiled to machine code, and this means that the Cranelift compiler has not removed the transformations made by WASM-MUTATE.

Suggestions

  • , )

insert '' by 'Vu,'

Happy suggestion

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L

Suggestions

  • Vu,

insert '' by '(P)'

Happy suggestion

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L

Suggestions

  • (P)

insert '' by 'Population_size'

Happy suggestion

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L

Suggestions

  • Population_size

L

replace 'L' by 'L.'

Happy suggestion

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L

Suggestions

  • L.

insert '' by 'L.'

Happy suggestion

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L

Suggestions

  • L.

insert '' by 'EV'

Happy suggestion

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,

(0)Population_size (1)(P) (2)Vu, (3)EV (4)L

Suggestions

  • EV

variants:

delete 'variants:' by ''

Happy suggestion

(0)Metric (1)2. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)its (9)population (10)size (11)as (12)defined (13)in (14)Metric (15)1 (16)and (17)the (18)JIT (19)compiler (20)C, (21)we (22)defined (23)the (24)ratio (25)of (26)preserved (27)variants (28)as:

(0)Metric (1)2. Ratio (2)of (3)preserved (4)variants: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P (11)and (12)its (13)population (14)size (15)as (16)defined (17)in (18)Metric (19)1 (20)and (21)the (22)JIT (23)compiler (24)C, (25)we (26)defined (27)the (28)ratio (29)of (30)preserved (31)variants (32)as:

Suggestions

preserved

delete 'preserved' by ''

Happy suggestion

(0)Metric (1)2. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)its (9)population (10)size (11)as (12)defined (13)in (14)Metric (15)1 (16)and (17)the (18)JIT (19)compiler (20)C, (21)we (22)defined (23)the (24)ratio (25)of (26)preserved (27)variants (28)as:

(0)Metric (1)2. Ratio (2)of (3)preserved (4)variants: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P (11)and (12)its (13)population (14)size (15)as (16)defined (17)in (18)Metric (19)1 (20)and (21)the (22)JIT (23)compiler (24)C, (25)we (26)defined (27)the (28)ratio (29)of (30)preserved (31)variants (32)as:

Suggestions

of

delete 'of' by ''

Happy suggestion

(0)Metric (1)2. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)its (9)population (10)size (11)as (12)defined (13)in (14)Metric (15)1 (16)and (17)the (18)JIT (19)compiler (20)C, (21)we (22)defined (23)the (24)ratio (25)of (26)preserved (27)variants (28)as:

(0)Metric (1)2. Ratio (2)of (3)preserved (4)variants: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P (11)and (12)its (13)population (14)size (15)as (16)defined (17)in (18)Metric (19)1 (20)and (21)the (22)JIT (23)compiler (24)C, (25)we (26)defined (27)the (28)ratio (29)of (30)preserved (31)variants (32)as:

Suggestions

Ratio

delete 'Ratio' by ''

Happy suggestion

(0)Metric (1)2. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)its (9)population (10)size (11)as (12)defined (13)in (14)Metric (15)1 (16)and (17)the (18)JIT (19)compiler (20)C, (21)we (22)defined (23)the (24)ratio (25)of (26)preserved (27)variants (28)as:

(0)Metric (1)2. Ratio (2)of (3)preserved (4)variants: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P (11)and (12)its (13)population (14)size (15)as (16)defined (17)in (18)Metric (19)1 (20)and (21)the (22)JIT (23)compiler (24)C, (25)we (26)defined (27)the (28)ratio (29)of (30)preserved (31)variants (32)as:

Suggestions

CWrit]

replace 'CWrit]' by '[Read]'

Happy suggestion

(0)[Read] (1)@x555555ed1570 (2)size=4 (3)value=0x1@dda (4)[Read] (5)@x555555ed1570 (6)size=4 (7)value=0x10dda (8)Listing (9)5: (10)Memory (11)trace (12)with (13)two (14)events (15)out (16)of (17)IntelPIN (18)for (19)the (20)execution (21)of (22)a (23)WebAssembly (24)program (25)with (26)wasmtime. Trace (27)events (28)record: (29)the (30)type (31)of (32)the (33)operation, (34)read (35)or (36)write, (37)the (38)memory (39)address, (40)the (41)number (42)of (43)bytes (44)affected (45)and (46)the (47)value (48)read (49)or (50)written.

(0)CWrit] (1)@x555555ed1570 (2)size=4 (3)value=0x1@dda (4)[Read] (5)@x555555ed1570 (6)size=4 (7)value=0x10dda (8)Listing (9)5: (10)Memory (11)trace (12)with (13)two (14)events (15)out (16)of (17)IntelPIN (18)for (19)the (20)execution (21)of (22)a (23)WebAssembly (24)program (25)with (26)wasmtime. Trace (27)events (28)record: (29)the (30)type (31)of (32)the (33)operation, (34)read (35)or (36)write, (37)the (38)memory (39)address, (40)the (41)number (42)of (43)bytes (44)affected (45)and (46)the (47)value (48)read (49)or (50)written.

Suggestions

  • [Read]

]

Unpaired symbol: ‘[’ seems to be missing

Happy suggestion

CWrit] @x555555ed1570 size=4 value=0x1@dda [Read] @x555555ed1570 size=4 value=0x10dda Listing 5: Memory trace with two events out of IntelPIN for the execution of a WebAssembly program with wasmtime. Trace events record: the type of the operation, read or write, the memory address, the number of bytes affected and the value read or written.

Suggestions

ratio:

replace 'ratio:' by 'ratio.'

Happy suggestion

(0)Since (1)WebAssembly (2)binaries (3)may (4)be (5)further (6)transformed (7)into (8)machine (9)code (10)before (11)they (12)execute, (13)we (14)also (15)check (16)that (17)these (18)additional (19)transformations (20)preserve (21)the (22)difference (23)introduced (24)by (25)WASM-MUTATE (26)in (27)the (28)WebAssembly (29)binary. We (30)use (31)the (32)wasmtime (33)JIT (34)compiler, (35)Cranelift, (36)with (37)all (38)available (39)optimizations, (40)to (41)generate (42)the (43)x86 (44)binaries (45)for (46)each (47)WebAssembly (48)program (49)and (50)its (51)variants (52)(step (53)GB) (54)in (55)figure). Then, (56)we (57)calculate (58)the (59)number (60)of (61)unique (62)variants (63)of (64)machine (65)code (66)representation (67)for (68)wasmtime. Counting (69)the (70)number (71)of (72)unique (73)machine (74)codes, (75)we (76)compute (77)the (78)diversification (79)preservation (80)ratio.

(0)Since (1)WebAssembly (2)binaries (3)may (4)be (5)further (6)transformed (7)into (8)machine (9)code (10)before (11)they (12)execute, (13)we (14)also (15)check (16)that (17)these (18)additional (19)transformations (20)preserve (21)the (22)difference (23)introduced (24)by (25)WASM-MUTATE (26)in (27)the (28)WebAssembly (29)binary. We (30)use (31)the (32)wasmtime (33)JIT (34)compiler, (35)Cranelift, (36)with (37)all (38)available (39)optimizations, (40)to (41)generate (42)the (43)x86 (44)binaries (45)for (46)each (47)WebAssembly (48)program (49)and (50)its (51)variants (52)(step (53)GB) (54)in (55)figure). Then, (56)we (57)calculate (58)the (59)number (60)of (61)unique (62)variants (63)of (64)machine (65)code (66)representation (67)for (68)wasmtime. Counting (69)the (70)number (71)of (72)unique (73)machine (74)codes, (75)we (76)compute (77)the (78)diversification (79)preservation (80)ratio:

Suggestions

  • ratio.

)

Unpaired symbol: ‘(’ seems to be missing

Happy suggestion

Since WebAssembly binaries may be further transformed into machine code before they execute, we also check that these additional transformations preserve the difference introduced by WASM-MUTATE in the WebAssembly binary. We use the wasmtime JIT compiler, Cranelift, with all available optimizations, to generate the x86 binaries for each WebAssembly program and its variants (step GB) in figure). Then, we calculate the number of unique variants of machine code representation for wasmtime. Counting the number of unique machine codes, we compute the diversification preservation ratio:

Suggestions

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)14 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)14 (5)of (6)25

Suggestions

  • 25.

k»,...,ky

delete 'k»,...,ky' by ''

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

ky,

delete 'ky,' by ''

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

=

replace '=' by 'k»,,ky'

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

  • k»,,ky

K

replace 'K' by 'ky,'

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

  • ky,

9C

replace '9C' by '='

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

  • =

5

replace '5' by 'K'

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

  • K

'0>

replace ''0>' by '9C'

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

  • 9C

D

replace 'D' by '5'

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

  • 5

data

replace 'data' by ''0>'

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

  • '0>

Given

replace 'Given' by 'D'

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

  • D

bandwidth:

replace 'bandwidth:' by 'data'

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

  • data

Attack

replace 'Attack' by 'Given'

Happy suggestion

(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?

(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?

Suggestions

  • Given

'

Unpaired symbol: ‘'’ seems to be missing

Happy suggestion

Metric 6. Attack bandwidth: Given data D '0> 5 9C K = ky, k»,...,ky the collection of correct data bytes, the ?

Suggestions

init

replace 'init' by 'Init'

Happy suggestion

(0)Init (1)measures (2)the (3)time (4)of (5)executing (6)the (7)_start (8)function (9)of (10)an (11)already (12)JITed (13)WebAssembly (14)binary.

(0)init (1)measures (2)the (3)time (4)of (5)executing (6)the (7)_start (8)function (9)of (10)an (11)already (12)JITed (13)WebAssembly (14)binary.

Suggestions

  • Init

init

This sentence does not start with an uppercase letter.

Happy suggestion

init(V) init(P)

Suggestions

  • Init

:

delete ':' by ''

Happy suggestion

(0)Notice (1)that, (2)the (3)bandwidth (4)metric (5)captures (6)not (7)only (8)whether (9)the (10)attacks (11)are (12)successful (13)or (14)not, (15)but (16)also (17)the (18)degree (19)to (20)which (21)the (22)data (23)exfiltration (24)is (25)hindered. For (26)instance, (27)a (28)variant (29)that (30)continues (31)to (32)exfiltrate (33)secret (34)data (35)but (36)does (37)so (38)over (39)an (40)impractical (41)duration (42)would (43)be (44)deemed (45)as (46)having (47)been (48)hardened. For (49)this, (50)we (51)state (52)the (53)bandwidth (54)metric (55)in (56)the (57)following (58)definition:

(0)Notice (1)that, (2)the (3)bandwidth (4)metric (5)captures (6)not (7)only (8)whether (9)the (10)attacks (11)are (12)successful (13)or (14)not, (15)but (16)also (17)the (18)degree (19)to (20)which (21)the (22)data (23)exfiltration (24)is (25)hindered. For (26)instance, (27)a (28)variant (29)that (30)continues (31)to (32)exfiltrate (33)secret (34)data (35)but (36)does (37)so (38)over (39)an (40)impractical (41)duration (42)would (43)be (44)deemed (45)as (46)having (47)been (48)hardened. For (49)this, (50)we (51)state (52)the (53)bandwidth (54)metric (55)in (56)the (57)following (58)definition (59):

Suggestions

definition

replace 'definition' by 'definition:'

Happy suggestion

(0)Notice (1)that, (2)the (3)bandwidth (4)metric (5)captures (6)not (7)only (8)whether (9)the (10)attacks (11)are (12)successful (13)or (14)not, (15)but (16)also (17)the (18)degree (19)to (20)which (21)the (22)data (23)exfiltration (24)is (25)hindered. For (26)instance, (27)a (28)variant (29)that (30)continues (31)to (32)exfiltrate (33)secret (34)data (35)but (36)does (37)so (38)over (39)an (40)impractical (41)duration (42)would (43)be (44)deemed (45)as (46)having (47)been (48)hardened. For (49)this, (50)we (51)state (52)the (53)bandwidth (54)metric (55)in (56)the (57)following (58)definition:

(0)Notice (1)that, (2)the (3)bandwidth (4)metric (5)captures (6)not (7)only (8)whether (9)the (10)attacks (11)are (12)successful (13)or (14)not, (15)but (16)also (17)the (18)degree (19)to (20)which (21)the (22)data (23)exfiltration (24)is (25)hindered. For (26)instance, (27)a (28)variant (29)that (30)continues (31)to (32)exfiltrate (33)secret (34)data (35)but (36)does (37)so (38)over (39)an (40)impractical (41)duration (42)would (43)be (44)deemed (45)as (46)having (47)been (48)hardened. For (49)this, (50)we (51)state (52)the (53)bandwidth (54)metric (55)in (56)the (57)following (58)definition (59):

Suggestions

  • definition:

divided

replace 'divided' by 'divide'

Happy suggestion

(0)For (1)each (2)of (3)the (4)four (5)WebAssembly (6)binaries (7)introduced (8)in (9)subsection (10)4.1, (11)we (12)generated (13)a (14)maximum (15)of (16)1000 (17)random (18)stacked (19)transformations (20)utilizing (21)100 (22)distinct (23)seeds. This (24)resulted (25)in (26)a (27)total (28)of (29)100,000 (30)variants (31)for (32)each (33)original (34)WebAssembly (35)binary. We (36)then (37)assess (38)the (39)success (40)rate (41)of (42)attacks (43)across (44)these (45)variants (46)by (47)measuring (48)the (49)bandwidth (50)of (51)the (52)exfiltrated (53)data, (54)that (55)is: (56)the (57)rate (58)of (59)correctly (60)leaked (61)bytes (62)per (63)unit (64)of (65)time. We (66)then (67)count (68)the (69)correctly (70)exfiltrated (71)bytes (72)and (73)divide (74)them (75)by (76)the (77)variant (78)program’s (79)execution (80)time.

(0)For (1)each (2)of (3)the (4)four (5)WebAssembly (6)binaries (7)introduced (8)in (9)subsection (10)4.1, (11)we (12)generated (13)a (14)maximum (15)of (16)1000 (17)random (18)stacked (19)transformations (20)utilizing (21)100 (22)distinct (23)seeds. This (24)resulted (25)in (26)a (27)total (28)of (29)100,000 (30)variants (31)for (32)each (33)original (34)WebAssembly (35)binary. We (36)then (37)assess (38)the (39)success (40)rate (41)of (42)attacks (43)across (44)these (45)variants (46)by (47)measuring (48)the (49)bandwidth (50)of (51)the (52)exfiltrated (53)data, (54)that (55)is: (56)the (57)rate (58)of (59)correctly (60)leaked (61)bytes (62)per (63)unit (64)of (65)time. We (66)then (67)count (68)the (69)correctly (70)exfiltrated (71)bytes (72)and (73)divided (74)them (75)by (76)the (77)variant (78)program’s (79)execution (80)time.

Suggestions

  • divide

P|

replace 'P|' by 'P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||'

Happy suggestion

(0)|MV| (1)|M (2)P|| (3)|MV| (4)|M (5)P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

(0)|MV| (1)|M (2)P|

Suggestions

  • P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

insert '' by 'P||'

Happy suggestion

(0)|MV| (1)|M (2)P|| (3)|MV| (4)|M (5)P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

(0)|MV| (1)|M (2)P|

Suggestions

  • P||

insert '' by '|M'

Happy suggestion

(0)|MV| (1)|M (2)P|| (3)|MV| (4)|M (5)P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

(0)|MV| (1)|M (2)P|

Suggestions

  • |M

insert '' by '|MV|'

Happy suggestion

(0)|MV| (1)|M (2)P|| (3)|MV| (4)|M (5)P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

(0)|MV| (1)|M (2)P|

Suggestions

  • |MV|

impact:

delete 'impact:' by ''

Happy suggestion

(0)Metric (1)4. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)a (9)variant (10)V, (11)given (12)MP (13)and (14)MV (15)the (16)machine (17)code (18)for (19)P (20)and (21)V (22)respectively, (23)the (24)relative (25)machine (26)code (27)size (28)is (29)defined (30)as:

(0)Metric (1)4. Relative (2)Machine (3)Code (4)size (5)impact: (6)Given (7)an (8)original (9)WebAssembly (10)program (11)P (12)and (13)a (14)variant (15)V, (16)given (17)MP (18)and (19)MV (20)the (21)machine (22)code (23)for (24)P (25)and (26)V (27)respectively, (28)the (29)relative (30)machine (31)code (32)size (33)is (34)defined (35)as:

Suggestions

size

delete 'size' by ''

Happy suggestion

(0)Metric (1)4. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)a (9)variant (10)V, (11)given (12)MP (13)and (14)MV (15)the (16)machine (17)code (18)for (19)P (20)and (21)V (22)respectively, (23)the (24)relative (25)machine (26)code (27)size (28)is (29)defined (30)as:

(0)Metric (1)4. Relative (2)Machine (3)Code (4)size (5)impact: (6)Given (7)an (8)original (9)WebAssembly (10)program (11)P (12)and (13)a (14)variant (15)V, (16)given (17)MP (18)and (19)MV (20)the (21)machine (22)code (23)for (24)P (25)and (26)V (27)respectively, (28)the (29)relative (30)machine (31)code (32)size (33)is (34)defined (35)as:

Suggestions

Code

delete 'Code' by ''

Happy suggestion

(0)Metric (1)4. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)a (9)variant (10)V, (11)given (12)MP (13)and (14)MV (15)the (16)machine (17)code (18)for (19)P (20)and (21)V (22)respectively, (23)the (24)relative (25)machine (26)code (27)size (28)is (29)defined (30)as:

(0)Metric (1)4. Relative (2)Machine (3)Code (4)size (5)impact: (6)Given (7)an (8)original (9)WebAssembly (10)program (11)P (12)and (13)a (14)variant (15)V, (16)given (17)MP (18)and (19)MV (20)the (21)machine (22)code (23)for (24)P (25)and (26)V (27)respectively, (28)the (29)relative (30)machine (31)code (32)size (33)is (34)defined (35)as:

Suggestions

Machine

delete 'Machine' by ''

Happy suggestion

(0)Metric (1)4. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)a (9)variant (10)V, (11)given (12)MP (13)and (14)MV (15)the (16)machine (17)code (18)for (19)P (20)and (21)V (22)respectively, (23)the (24)relative (25)machine (26)code (27)size (28)is (29)defined (30)as:

(0)Metric (1)4. Relative (2)Machine (3)Code (4)size (5)impact: (6)Given (7)an (8)original (9)WebAssembly (10)program (11)P (12)and (13)a (14)variant (15)V, (16)given (17)MP (18)and (19)MV (20)the (21)machine (22)code (23)for (24)P (25)and (26)V (27)respectively, (28)the (29)relative (30)machine (31)code (32)size (33)is (34)defined (35)as:

Suggestions

Relative

delete 'Relative' by ''

Happy suggestion

(0)Metric (1)4. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)a (9)variant (10)V, (11)given (12)MP (13)and (14)MV (15)the (16)machine (17)code (18)for (19)P (20)and (21)V (22)respectively, (23)the (24)relative (25)machine (26)code (27)size (28)is (29)defined (30)as:

(0)Metric (1)4. Relative (2)Machine (3)Code (4)size (5)impact: (6)Given (7)an (8)original (9)WebAssembly (10)program (11)P (12)and (13)a (14)variant (15)V, (16)given (17)MP (18)and (19)MV (20)the (21)machine (22)code (23)for (24)P (25)and (26)V (27)respectively, (28)the (29)relative (30)machine (31)code (32)size (33)is (34)defined (35)as:

Suggestions

specula-tive

replace 'specula-tive' by 'speculative'

Happy suggestion

(0)Narayan (1)and (2)colleagues (3)successfully (4)bypass (5)the (6)control (7)flow (8)integrity (9)safeguards (10)of (11)WebAssembly, (12)using (13)speculative (14)code (15)execution (16)as (17)detailed (18)in (19)[30]. Thus, (20)we (21)use (22)the (23)same (24)three (25)Spectre (26)attacks (27)from (28)Swivel: (29)1) (30)The (31)Spectre (32)Branch (33)Target (34)Buffer (35)(btb) (36)attack (37)exploits (38)the (39)branch (40)target (41)buffer (42)by (43)predicting (44)the (45)target (46)of (47)an (48)indirect (49)jump, (50)thereby (51)rerouting (52)speculative (53)control (54)flow (55)to (56)an (57)arbitrary (58)target. 2) (59)The (60)Spectre (61)Pattern (62)History (63)Table (64)(pht) (65)takes (66)advantage (67)of (68)the (69)pattern (70)history (71)table (72)to (73)anticipate (74)the (75)direction (76)of (77)a (78)conditional (79)branch (80)during (81)the (82)ongoing (83)evaluation (84)of (85)a (86)condition. 3) (87)The (88)Spectre (89)Return (90)Stack (91)Buffer (92)(ret2spec) (93)attack (94)exploits (95)the (96)return (97)stack (98)buffer (99)that (100)stores (101)the (102)locations (103)of (104)recently (105)executed (106)call (107)instructions (108)to (109)predict (110)the (111)target (112)of (113)ret (114)instructions. Each (115)attack (116)methodology (117)relies (118)on (119)the (120)extraction (121)of (122)memory (123)bytes (124)from (125)another (126)hosted (127)WebAssembly (128)binary (129)that (130)executes (131)in (132)parallel.

(0)Narayan (1)and (2)colleagues (3)successfully (4)bypass (5)the (6)control (7)flow (8)integrity (9)safeguards (10)of (11)WebAssembly, (12)using (13)specula-tive (14)code (15)execution (16)as (17)detailed (18)in (19)[30]. Thus, (20)we (21)use (22)the (23)same (24)three (25)Spectre (26)attacks (27)from (28)Swivel: (29)1) (30)The (31)Spectre (32)Branch (33)Target (34)Buffer (35)(btb) (36)attack (37)exploits (38)the (39)branch (40)target (41)buffer (42)by (43)predicting (44)the (45)target (46)of (47)an (48)indirect (49)jump, (50)thereby (51)rerouting (52)speculative (53)control (54)flow (55)to (56)an (57)arbitrary (58)target. 2) (59)The (60)Spectre (61)Pattern (62)History (63)Table (64)(pht) (65)takes (66)advantage (67)of (68)the (69)pattern (70)history (71)table (72)to (73)anticipate (74)the (75)direction (76)of (77)a (78)conditional (79)branch (80)during (81)the (82)ongoing (83)evaluation (84)of (85)a (86)condition. 3) (87)The (88)Spectre (89)Return (90)Stack (91)Buffer (92)(ret2spec) (93)attack (94)exploits (95)the (96)return (97)stack (98)buffer (99)that (100)stores (101)the (102)locations (103)of (104)recently (105)executed (106)call (107)instructions (108)to (109)predict (110)the (111)target (112)of (113)ret (114)instructions. Each (115)attack (116)methodology (117)relies (118)on (119)the (120)extraction (121)of (122)memory (123)bytes (124)from (125)another (126)hosted (127)WebAssembly (128)binary (129)that (130)executes (131)in (132)parallel.

Suggestions

  • speculative

ret2spec

Possible typo detected.

Happy suggestion

Narayan and colleagues successfully bypass the control flow integrity safeguards of WebAssembly, using specula-tive code execution as detailed in [30]. Thus, we use the same three Spectre attacks from Swivel: 1) The Spectre Branch Target Buffer (btb) attack exploits the branch target buffer by predicting the target of an indirect jump, thereby rerouting speculative control flow to an arbitrary target. 2) The Spectre Pattern History Table (pht) takes advantage of the pattern history table to anticipate the direction of a conditional branch during the ongoing evaluation of a condition. 3) The Spectre Return Stack Buffer (ret2spec) attack exploits the return stack buffer that stores the locations of recently executed call instructions to predict the target of ret instructions. Each attack methodology relies on the extraction of memory bytes from another hosted WebAssembly binary that executes in parallel.

Suggestions

  • respect
  • retype
  • retyped
  • retypes

to

replace 'to' by 'To'

Happy suggestion

(0)To (1)answer (2)RQ4, (3)we (4)apply (5)WASM-MUTATE (6)to (7)the (8)same (9)security (10)WebAssembly (11)programs (12)used (13)by (14)Narayan (15)et (16)al. To (17)evaluate (18)Swivel’s (19)ability (20)to (21)protect (22)WebAssembly (23)programs (24)against (25)side-channel (26)attacks (27)[38]. The (28)four (29)cache (30)timing (31)side-channel (32)attacks (33)are (34)presented (35)in (36)detail (37)in (38)subsection (39)4.1. The (40)specific (41)binary (42)and (43)its (44)corresponding (45)attack (46)can (47)be (48)appreciated (49)in (50)Table (51)1. We (52)evaluate (53)to (54)what (55)extent (56)WASM-MUTATE (57)can (58)prevent (59)such (60)attacks. In (61)the (62)following (63)text, (64)we (65)describe (66)the (67)attacks (68)we (69)replicate (70)and (71)evaluate (72)in (73)order (74)to (75)answer (76)RQ4.

(0)To (1)answer (2)RQ4, (3)we (4)apply (5)WASM-MUTATE (6)to (7)the (8)same (9)security (10)WebAssembly (11)programs (12)used (13)by (14)Narayan (15)et (16)al. to (17)evaluate (18)Swivel’s (19)ability (20)to (21)protect (22)WebAssembly (23)programs (24)against (25)side-channel (26)attacks (27)[38]. The (28)four (29)cache (30)timing (31)side-channel (32)attacks (33)are (34)presented (35)in (36)detail (37)in (38)subsection (39)4.1. (40)The (41)specific (42)binary (43)and (44)its (45)corresponding (46)attack (47)can (48)be (49)appreciated (50)in (51)Table (52)1. We (53)evaluate (54)to (55)what (56)extent (57)WASM-MUTATE (58)can (59)prevent (60)such (61)attacks. In (62)the (63)following (64)text, (65)we (66)describe (67)the (68)attacks (69)we (70)replicate (71)and (72)evaluate (73)in (74)order (75)to (76)answer (77)RQ4.

Suggestions

  • To

insert '' by 'protocol.'

Happy suggestion

(0)4.5. Protocol (1)for (2)RQ4 (3)protocol.

(0)4.5. Protocol (1)for (2)RQ4

Suggestions

  • protocol.

insert '' by 'protocol.'

Happy suggestion

(0)4.4. Protocol (1)for (2)RQ3 (3)protocol.

(0)4.4. Protocol (1)for (2)RQ3

Suggestions

  • protocol.

25

replace '25' by '25.'

Happy suggestion

(0)We (1)collect (2)Metric (3)5 (4)after (5)running (6)each (7)program (8)and (9)variant (10)100 (11)times. We (12)discard (13)the (14)first (15)20 (16)measurements (17)to (18)remove (19)noise (20)and (21)warm (22)up (23)the (24)JIT (25)engine. Thus, (26)for (27)each (28)program (29)and (30)variant, (31)we (32)collect (33)80 (34)execution (35)times. 199, (36)91,-50C5 (37)Dellg (38)eEXfliirdied (39)Wl (40)llme (41)£ (42)aNd (43)| (44)K (45)= (46)ky, (47)k»,...,ky (48)the (49)collection (50)of (51)correct (52)data (53)bytes, (54)the (55)Cabrera-Arteaga (56)et (57)al. Page (58)15 (59)of (60)25.

(0)We (1)collect (2)Metric (3)5 (4)after (5)running (6)each (7)program (8)and (9)variant (10)100 (11)times. We (12)discard (13)the (14)first (15)20 (16)measurements (17)to (18)remove (19)noise (20)and (21)warm (22)up (23)the (24)JIT (25)engine. Thus, (26)for (27)each (28)program (29)and (30)variant, (31)we (32)collect (33)80 (34)execution (35)times. (36)199, (37)91,--50C5 (38)Dellg (39)eEXfliirdied (40)Wl (41)llme (42)£ (43)aNd (44)| (45)K (46)= (47)ky, (48)k»,...,ky (49)the (50)collection (51)of (52)correct (53)data (54)bytes, (55)the (56)Cabrera-Arteaga (57)et (58)al. (59)Page (60)15 (61)of (62)25

Suggestions

  • 25.

91,--50C5

replace '91,--50C5' by '91,-50C5'

Happy suggestion

(0)We (1)collect (2)Metric (3)5 (4)after (5)running (6)each (7)program (8)and (9)variant (10)100 (11)times. We (12)discard (13)the (14)first (15)20 (16)measurements (17)to (18)remove (19)noise (20)and (21)warm (22)up (23)the (24)JIT (25)engine. Thus, (26)for (27)each (28)program (29)and (30)variant, (31)we (32)collect (33)80 (34)execution (35)times. 199, (36)91,-50C5 (37)Dellg (38)eEXfliirdied (39)Wl (40)llme (41)£ (42)aNd (43)| (44)K (45)= (46)ky, (47)k»,...,ky (48)the (49)collection (50)of (51)correct (52)data (53)bytes, (54)the (55)Cabrera-Arteaga (56)et (57)al. Page (58)15 (59)of (60)25.

(0)We (1)collect (2)Metric (3)5 (4)after (5)running (6)each (7)program (8)and (9)variant (10)100 (11)times. We (12)discard (13)the (14)first (15)20 (16)measurements (17)to (18)remove (19)noise (20)and (21)warm (22)up (23)the (24)JIT (25)engine. Thus, (26)for (27)each (28)program (29)and (30)variant, (31)we (32)collect (33)80 (34)execution (35)times. (36)199, (37)91,--50C5 (38)Dellg (39)eEXfliirdied (40)Wl (41)llme (42)£ (43)aNd (44)| (45)K (46)= (47)ky, (48)k»,...,ky (49)the (50)collection (51)of (52)correct (53)data (54)bytes, (55)the (56)Cabrera-Arteaga (57)et (58)al. (59)Page (60)15 (61)of (62)25

Suggestions

  • 91,-50C5

,.

Put a space after the comma.

Happy suggestion

We collect Metric 5 after running each program and variant 100 times. We discard the first 20 measurements to remove noise and warm up the JIT engine. Thus, for each program and variant, we collect 80 execution times. 199, 91,--50C5 Dellg eEXfliirdied Wl llme £ aNd | K = ky, k»,...,ky the collection of correct data bytes, the Cabrera-Arteaga et al. Page 15 of 25

Suggestions

  • , .

insert '' by '('

Happy suggestion

(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(

(0)5. Experimental (1)Results

Suggestions

  • (

insert '' by '-'

Happy suggestion

(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(

(0)5. Experimental (1)Results

Suggestions

  • -

insert '' by 'Results)'

Happy suggestion

(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(

(0)5. Experimental (1)Results

Suggestions

  • Results)

insert '' by '(Experimental'

Happy suggestion

(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(

(0)5. Experimental (1)Results

Suggestions

  • (Experimental

insert '' by 'Results'

Happy suggestion

(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(

(0)5. Experimental (1)Results

Suggestions

  • Results

insert '' by 'Experimental'

Happy suggestion

(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(

(0)5. Experimental (1)Results

Suggestions

  • Experimental

T

replace 'T' by 'T.'

Happy suggestion

(0)b; (1)such (2)that (3)b; (4)€ (5)K| (6)T.

(0)|b; (1)such (2)that (3)b; (4)€ (5)K| (6)T

Suggestions

  • T.

|b;

replace '|b;' by 'b;'

Happy suggestion

(0)b; (1)such (2)that (3)b; (4)€ (5)K| (6)T.

(0)|b; (1)such (2)that (3)b; (4)€ (5)K| (6)T

Suggestions

  • b;

insert '' by 'The'

Happy suggestion

(0)The (1)bandwidth (2)metric (3)is (4)defined (5)as:

(0)bandwidth (1)metric (2)is (3)defined (4)as:

Suggestions

  • The

bandwidth

This sentence does not start with an uppercase letter.

Happy suggestion

bandwidth metric is defined as:

Suggestions

  • Bandwidth

popula-tion

replace 'popula-tion' by 'population'

Happy suggestion

(0)We (1)have (2)observed (3)a (4)significant (5)variation (6)in (7)the (8)population (9)size (10)out (11)of (12)WASM-MUTATE (13)between (14)different (15)programs, (16)ranging (17)by (18)several (19)thousand (20)variants (21)(from (22)a (23)maximum (24)of (25)53816 (26)variants (27)to (28)a (29)minimum (30)of (31)5716 (32)variants). This (33)disparity (34)is (35)attributed (36)to: (37)the (38)non-deterministic (39)nature (40)of (41)WASM-MUTATE (42)and (43)2) (44)the (45)characteristics (46)of (47)the (48)program. WASM-MUTATE (49)mutates (50)a (51)randomly (52)selected (53)portion (54)of (55)a (56)program. If (57)the (58)selected (59)instruction (60)is (61)determined (62)to (63)be (64)non-deterministic, (65)despite (66)the (67)transformation (68)being (69)semantically (70)equivalent, (71)WASM-MUTATE (72)discards (73)the (74)variant (75)and (76)moves (77)on (78)to (79)another (80)random (81)transformation. For (82)instance, (83)if (84)the (85)instruction (86)targeted (87)for (88)mutation (89)is (90)a (91)function (92)call, (93)WASM-MUTATE (94)proceeds (95)to (96)the (97)next (98)one. This (99)process, (100)in (101)conjunction (102)with (103)the (104)unique (105)characteristics (106)of (107)each (108)program, (109)results (110)in (111)a (112)varying (113)population (114)size. For (115)example, (116)an (117)input (118)binary (119)with (120)a (121)high (122)number (123)of (124)function (125)calls (126)would (127)lead (128)to (129)a (130)greater (131)number (132)of (133)trials (134)and (135)errors, (136)slowing (137)down (138)the (139)generation (140)of (141)variants, (142)thereby (143)resulting (144)in (145)a (146)smaller (147)overall (148)population (149)size (150)for (151)1 (152)hour (153)of (154)WASM-MUTATE (155)execution.

(0)We (1)have (2)observed (3)a (4)significant (5)variation (6)in (7)the (8)popula-tion (9)size (10)out (11)of (12)WASM-MUTATE (13)between (14)different (15)programs, (16)ranging (17)by (18)several (19)thousand (20)variants (21)(from (22)a (23)maximum (24)of (25)53816 (26)variants (27)to (28)a (29)minimum (30)of (31)5716 (32)variants). This (33)disparity (34)is (35)attributed (36)to: (37)the (38)non-deterministic (39)nature (40)of (41)WASM-MUTATE (42)and (43)2) (44)the (45)characteristics (46)of (47)the (48)program. (49)WASM-MUTATE (50)mutates (51)a (52)randomly (53)selected (54)portion (55)of (56)a (57)program. If (58)the (59)selected (60)instruction (61)is (62)determined (63)to (64)be (65)non-deterministic, (66)despite (67)the (68)transformation (69)being (70)semantically (71)equivalent, (72)WASM-MUTATE (73)discards (74)the (75)variant (76)and (77)moves (78)on (79)to (80)another (81)random (82)transformation. For (83)instance, (84)if (85)the (86)instruction (87)targeted (88)for (89)mutation (90)is (91)a (92)function (93)call, (94)WASM-MUTATE (95)proceeds (96)to (97)the (98)next (99)one. This (100)process, (101)in (102)conjunction (103)with (104)the (105)unique (106)characteristics (107)of (108)each (109)program, (110)results (111)in (112)a (113)varying (114)population (115)size. For (116)example, (117)an (118)input (119)binary (120)with (121)a (122)high (123)number (124)of (125)function (126)calls (127)would (128)lead (129)to (130)a (131)greater (132)number (133)of (134)trials (135)and (136)errors, (137)slowing (138)down (139)the (140)generation (141)of (142)variants, (143)thereby (144)resulting (145)in (146)a (147)smaller (148)overall (149)population (150)size (151)for (152)1 (153)hour (154)of (155)WASM-MUTATE (156)execution.

Suggestions

  • population

50000

replace '50000' by '50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000'

Happy suggestion

(0)50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000

(0)50000

Suggestions

  • 50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000

a8eyueo1eg

replace 'a8eyueo1eg' by 'a8eyueo1eg.'

Happy suggestion

(0)oO (1)aa (2)N (3)So (4)suoyefndod (5)urersoid (6)jo (7)a8eyueo1eg.

(0)oO (1)aa (2)N (3)So (4)suoyefndod (5)urersoid (6)jo (7)a8eyueo1eg

Suggestions

  • a8eyueo1eg.

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)16 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)16 (5)of (6)25

Suggestions

  • 25.

100%

replace '100%' by '100%.'

Happy suggestion

(0)To (1)answer (2)the (3)question (4)RQ2, (5)we (6)measure (7)how (8)long (9)it (10)takes (11)to (12)generate (13)one (14)variant (15)that (16)exhibits (17)execution (18)traces (19)that (20)are (21)different (22)from (23)the (24)original. In (25)Figure (26)7, (27)we (28)display (29)a (30)cumulative (31)distribution (32)plot (33)showing (34)the (35)time (36)required (37)for (38)WASM-MUTATE (39)to (40)generate (41)variants (42)with (43)different (44)traces, (45)in (46)blue (47)for (48)machine (49)code (50)instructions (51)and (52)green (53)for (54)memory (55)traces. The (56)X-axis (57)marks (58)time (59)in (60)minutes, (61)and (62)the (63)Y-axis (64)shows (65)the (66)ratio (67)of (68)programs (69)from (70)303 (71)for (72)which (73)WASM-MUTATE (74)created (75)a (76)variant (77)within (78)that (79)time. For (80)all (81)original (82)programs, (83)WASM-MUTATE (84)succeeds (85)in (86)generating (87)one (88)variant (89)with (90)different (91)traces (92)compared (93)to (94)the (95)original (96)program, (97)either (98)in (99)machine (100)code (101)instructions (102)or (103)memory (104)access, (105)i.e., (106)both (107)cumulative (108)distributions (109)reach (110)100%. (111)The (112)shortest (113)time (114)to (115)generate (116)a (117)variant (118)with (119)different (120)machine (121)code (122)instruction (123)traces (124)is (125)0.12 (126)seconds, (127)and (128)for (129)different (130)memory (131)traces, (132)it (133)is (134)0.06 (135)seconds. In (136)the (137)slowest (138)scenarios, (139)WASM-MUTATE (140)takes (141)under (142)| (143)minute (144)for (145)different (146)machine (147)code (148)instruction (149)traces (150)and (151)less (152)than (153)3 (154)minutes (155)for (156)different (157)memory (158)traces. Overall, (159)WASM-MUTATE (160)takes (161)a (162)median (163)of (164)5.4 (165)seconds (166)and (167)12.6 (168)seconds (169)in (170)generating (171)variants (172)with (173)different (174)machine (175)code (176)instructions (177)and (178)different (179)memory (180)instructions (181)respectively.

(0)To (1)answer (2)question (3)RQ2, (4)we (5)measure (6)how (7)long (8)it (9)takes (10)to (11)generate (12)one (13)variant (14)that (15)exhibits (16)execution (17)traces (18)that (19)are (20)different (21)from (22)the (23)original. In (24)Figure (25)7, (26)we (27)display (28)a (29)cumulative (30)distribution (31)plot (32)showing (33)the (34)time (35)required (36)for (37)WASM-MUTATE (38)to (39)generate (40)variants (41)with (42)different (43)traces, (44)in (45)blue (46)for (47)machine (48)code (49)instructions (50)and (51)green (52)for (53)memory (54)traces. The (55)X-axis (56)marks (57)time (58)in (59)minutes, (60)and (61)the (62)Y-axis (63)shows (64)the (65)ratio (66)of (67)programs (68)from (69)303 (70)for (71)which (72)WASM-MUTATE (73)created (74)a (75)variant (76)within (77)that (78)time. For (79)all (80)original (81)programs, (82)WASM-MUTATE (83)succeeds (84)in (85)generating (86)one (87)variant (88)with (89)different (90)traces (91)compared (92)to (93)the (94)original (95)program, (96)either (97)in (98)machine (99)code (100)instructions (101)or (102)memory (103)access, (104)i.e., (105)both (106)cumulative (107)distributions (108)reach (109)100% (110)The (111)shortest (112)time (113)to (114)generate (115)a (116)variant (117)with (118)different (119)machine (120)code (121)instruction (122)traces (123)is (124)0.12 (125)seconds, (126)and (127)for (128)different (129)memory (130)traces, (131)it (132)is (133)0.06 (134)seconds. In (135)the (136)slowest (137)scenarios, (138)WASM-MUTATE (139)takes (140)under (141)| (142)minute (143)for (144)different (145)machine (146)code (147)instruction (148)traces (149)and (150)less (151)than (152)3 (153)minutes (154)for (155)different (156)memory (157)traces. Overall, (158)WASM-MUTATE (159)takes (160)a (161)median (162)of (163)5.4 (164)seconds (165)and (166)12.6 (167)seconds (168)in (169)generating (170)variants (171)with (172)different (173)machine (174)code (175)instructions (176)and (177)different (178)memory (179)instructions (180)respectively.

Suggestions

  • 100%.

insert '' by 'the'

Happy suggestion

(0)To (1)answer (2)the (3)question (4)RQ2, (5)we (6)measure (7)how (8)long (9)it (10)takes (11)to (12)generate (13)one (14)variant (15)that (16)exhibits (17)execution (18)traces (19)that (20)are (21)different (22)from (23)the (24)original. In (25)Figure (26)7, (27)we (28)display (29)a (30)cumulative (31)distribution (32)plot (33)showing (34)the (35)time (36)required (37)for (38)WASM-MUTATE (39)to (40)generate (41)variants (42)with (43)different (44)traces, (45)in (46)blue (47)for (48)machine (49)code (50)instructions (51)and (52)green (53)for (54)memory (55)traces. The (56)X-axis (57)marks (58)time (59)in (60)minutes, (61)and (62)the (63)Y-axis (64)shows (65)the (66)ratio (67)of (68)programs (69)from (70)303 (71)for (72)which (73)WASM-MUTATE (74)created (75)a (76)variant (77)within (78)that (79)time. For (80)all (81)original (82)programs, (83)WASM-MUTATE (84)succeeds (85)in (86)generating (87)one (88)variant (89)with (90)different (91)traces (92)compared (93)to (94)the (95)original (96)program, (97)either (98)in (99)machine (100)code (101)instructions (102)or (103)memory (104)access, (105)i.e., (106)both (107)cumulative (108)distributions (109)reach (110)100%. (111)The (112)shortest (113)time (114)to (115)generate (116)a (117)variant (118)with (119)different (120)machine (121)code (122)instruction (123)traces (124)is (125)0.12 (126)seconds, (127)and (128)for (129)different (130)memory (131)traces, (132)it (133)is (134)0.06 (135)seconds. In (136)the (137)slowest (138)scenarios, (139)WASM-MUTATE (140)takes (141)under (142)| (143)minute (144)for (145)different (146)machine (147)code (148)instruction (149)traces (150)and (151)less (152)than (153)3 (154)minutes (155)for (156)different (157)memory (158)traces. Overall, (159)WASM-MUTATE (160)takes (161)a (162)median (163)of (164)5.4 (165)seconds (166)and (167)12.6 (168)seconds (169)in (170)generating (171)variants (172)with (173)different (174)machine (175)code (176)instructions (177)and (178)different (179)memory (180)instructions (181)respectively.

(0)To (1)answer (2)question (3)RQ2, (4)we (5)measure (6)how (7)long (8)it (9)takes (10)to (11)generate (12)one (13)variant (14)that (15)exhibits (16)execution (17)traces (18)that (19)are (20)different (21)from (22)the (23)original. In (24)Figure (25)7, (26)we (27)display (28)a (29)cumulative (30)distribution (31)plot (32)showing (33)the (34)time (35)required (36)for (37)WASM-MUTATE (38)to (39)generate (40)variants (41)with (42)different (43)traces, (44)in (45)blue (46)for (47)machine (48)code (49)instructions (50)and (51)green (52)for (53)memory (54)traces. The (55)X-axis (56)marks (57)time (58)in (59)minutes, (60)and (61)the (62)Y-axis (63)shows (64)the (65)ratio (66)of (67)programs (68)from (69)303 (70)for (71)which (72)WASM-MUTATE (73)created (74)a (75)variant (76)within (77)that (78)time. For (79)all (80)original (81)programs, (82)WASM-MUTATE (83)succeeds (84)in (85)generating (86)one (87)variant (88)with (89)different (90)traces (91)compared (92)to (93)the (94)original (95)program, (96)either (97)in (98)machine (99)code (100)instructions (101)or (102)memory (103)access, (104)i.e., (105)both (106)cumulative (107)distributions (108)reach (109)100% (110)The (111)shortest (112)time (113)to (114)generate (115)a (116)variant (117)with (118)different (119)machine (120)code (121)instruction (122)traces (123)is (124)0.12 (125)seconds, (126)and (127)for (128)different (129)memory (130)traces, (131)it (132)is (133)0.06 (134)seconds. In (135)the (136)slowest (137)scenarios, (138)WASM-MUTATE (139)takes (140)under (141)| (142)minute (143)for (144)different (145)machine (146)code (147)instruction (148)traces (149)and (150)less (151)than (152)3 (153)minutes (154)for (155)different (156)memory (157)traces. Overall, (158)WASM-MUTATE (159)takes (160)a (161)median (162)of (163)5.4 (164)seconds (165)and (166)12.6 (167)seconds (168)in (169)generating (170)variants (171)with (172)different (173)machine (174)code (175)instructions (176)and (177)different (178)memory (179)instructions (180)respectively.

Suggestions

  • the

the

delete 'the' by ''

Happy suggestion

(0)Answer (1)to (2)RQ1: (3)WASM-MUTATE (4)generates (5)Web-Assembly (6)variants (7)for (8)all (9)303 (10)input (11)programs. Within (12)a (13)one-hour (14)diversification (15)budget, (16)WASM-MUTATE (17)synthesizes (18)more (19)than (20)9000 (21)unique (22)variants (23)per (24)program (25)on (26)average. 62% (27)of (28)the (29)variants (30)remain (31)different (32)after (33)machine-code (34)compilation. _WASM-MUTATE (35)is (36)good (37)at (38)producing (39)many (40)WebAssembly (41)program (42)variants.

(0)Answer (1)to (2)RQ1: (3)WASM-MUTATE (4)generates (5)Web-Assembly (6)variants (7)for (8)all (9)the (10)303 (11)input (12)programs. (13)Within (14)a (15)one-hour (16)diversification (17)budget, (18)WASM-MUTATE (19)synthesizes (20)more (21)than (22)9000 (23)unique (24)variants (25)per (26)program (27)on (28)average. 62% (29)of (30)the (31)variants (32)remain (33)different (34)after (35)machine-code (36)compilation. _WASM-MUTATE (37)is (38)good (39)at (40)producing (41)many (42)WebAssembly (43)program (44)variants.

Suggestions

insert '' by '2.5.'

Happy suggestion

(0)— (1)Until (2)diff. Instruction (3)—— (4)Until (5)diff. Mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5 (11)2.5.

(0)— (1)Until (2)diff. instruction (3)—— (4)Until (5)diff. mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5

Suggestions

  • 2.5.

mem

replace 'mem' by 'Mem'

Happy suggestion

(0)— (1)Until (2)diff. Instruction (3)—— (4)Until (5)diff. Mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5 (11)2.5.

(0)— (1)Until (2)diff. instruction (3)—— (4)Until (5)diff. mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5

Suggestions

  • Mem

instruction

replace 'instruction' by 'Instruction'

Happy suggestion

(0)— (1)Until (2)diff. Instruction (3)—— (4)Until (5)diff. Mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5 (11)2.5.

(0)— (1)Until (2)diff. instruction (3)—— (4)Until (5)diff. mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5

Suggestions

  • Instruction

instruction

This sentence does not start with an uppercase letter.

Happy suggestion

— Until diff. instruction —— Until diff. mem access 1.0 1.5 2.0 2.5

Suggestions

  • Instruction

2.5

replace '2.5' by '2.5.'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • 2.5.

2.0

replace '2.0' by '2.5'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • 2.5

1.5

replace '1.5' by '2.0'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • 2.0

1.0

replace '1.0' by '1.5'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • 1.5

0.5

replace '0.5' by '1.0'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • 1.0

0.0

replace '0.0' by '0.5'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • 0.5

1

replace '1' by '0.0'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • 0.0

r

replace 'r' by '1'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • 1

insert '' by 'r'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • r

mem

replace 'mem' by 'Mem'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • Mem

instruction

replace 'instruction' by 'Instruction'

Happy suggestion

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.

(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5

Suggestions

  • Instruction

instruction

This sentence does not start with an uppercase letter.

Happy suggestion

Cumulative distribution 1.00 0.75 0.50 0.25 — Until diff. instruction — Until diff. mem access 0.00 1 r r 1 1 0.0 0.5 1.0 1.5 2.0 2.5

Suggestions

  • Instruction

gen-eration

replace 'gen-eration' by 'generation'

Happy suggestion

(0)The (1)use (2)of (3)an (4)e-graph (5)random (6)traversal (7)is (8)the (9)key (10)factor (11)for (12)such (13)a (14)fast (15)generation (16)process. Once (17)WASM-MUTATE (18)locates (19)a (20)modifiable (21)instruction (22)within (23)the (24)binary (25)and (26)constructs (27)its (28)corresponding (29)e-graph, (30)traversal (31)is (32)virtually (33)instantaneous. However, (34)the (35)time (36)efficiency (37)of (38)variant (39)generation (40)is (41)not (42)consistent (43)across (44)all (45)programs, (46)as (47)illustrated (48)in (49)Figure (50)7. This (51)variation (52)primarily (53)stems (54)from (55)the (56)varying (57)complexities (58)of (59)the (60)programs (61)under (62)analysis, (63)as (64)previously (65)mentioned (66)in (67)subsection (68)5.1. Interestingly, (69)WASM-MUTATE (70)may (71)attempt (72)to (73)build (74)e-graphs (75)from (76)instructions (77)that, (78)while (79)not (80)inherently (81)leading (82)to (83)undefined (84)behavior, (85)are (86)part (87)of (88)a (89)data (90)flow (91)graph (92)that (93)could. For (94)example, (95)the (96)data (97)flow (98)graph (99)might (100)be (101)dependent (102)on (103)a (104)function (105)call. Although (106)transforming (107)undefined (108)behavioral (109)instructions (110)is (111)deactivated (112)by (113)default (114)in (115)WASM-MUTATE (116)to (117)maintain (118)functional (119)equivalence (120)with (121)the (122)original (123)code, (124)the (125)process (126)of (127)attempting (128)to (129)construct (130)such (131)e-graphs (132)can (133)extend (134)the (135)duration (136)of (137)the (138)diversification (139)pass. As (140)a (141)result, (142)WASM-MUTATE (143)may (144)require (145)multiple (146)attempts (147)to (148)successfully (149)create (150)and (151)traverse (152)an (153)e-graph, (154)impacting (155)the (156)rate (157)at (158)which (159)it (160)generates (161)behaviorally (162)distinct (163)variants. This (164)phenomenon (165)is (166)particularly (167)noticeable (168)in (169)original (170)programs (171)that (172)have (173)a (174)high (175)frequency (176)of (177)function (178)calls.

(0)The (1)use (2)of (3)an (4)e-graph (5)random (6)traversal (7)is (8)the (9)key (10)factor (11)for (12)such (13)a (14)fast (15)generation (16)process. Once (17)WASM-MUTATE (18)locates (19)a (20)modifiable (21)instruction (22)within (23)the (24)binary (25)and (26)constructs (27)its (28)corresponding (29)e-graph, (30)traversal (31)is (32)virtually (33)instantaneous. However, (34)the (35)time (36)efficiency (37)of (38)variant (39)gen-eration (40)is (41)not (42)consistent (43)across (44)all (45)programs, (46)as (47)illustrated (48)in (49)Figure (50)7. This (51)variation (52)primarily (53)stems (54)from (55)the (56)varying (57)complexities (58)of (59)the (60)programs (61)under (62)analysis, (63)as (64)previously (65)mentioned (66)in (67)subsection (68)5.1. Interestingly, (69)WASM-MUTATE (70)may (71)attempt (72)to (73)build (74)e-graphs (75)from (76)instructions (77)that, (78)while (79)not (80)inherently (81)leading (82)to (83)undefined (84)behavior, (85)are (86)part (87)of (88)a (89)data (90)flow (91)graph (92)that (93)could. For (94)example, (95)the (96)data (97)flow (98)graph (99)might (100)be (101)dependent (102)on (103)a (104)function (105)call. (106)Although (107)transforming (108)undefined (109)behavioral (110)instructions (111)is (112)deactivated (113)by (114)default (115)in (116)WASM-MUTATE (117)to (118)maintain (119)functional (120)equivalence (121)with (122)the (123)original (124)code, (125)the (126)process (127)of (128)attempting (129)to (130)construct (131)such (132)e-graphs (133)can (134)extend (135)the (136)duration (137)of (138)the (139)diversification (140)pass. As (141)a (142)result, (143)WASM-MUTATE (144)may (145)require (146)multiple (147)attempts (148)to (149)successfully (150)create (151)and (152)traverse (153)an (154)e-graph, (155)impacting (156)the (157)rate (158)at (159)which (160)it (161)generates (162)behaviorally (163)distinct (164)variants. This (165)phenomenon (166)is (167)particularly (168)noticeable (169)in (170)original (171)programs (172)that (173)have (174)a (175)high (176)frequency (177)of (178)function (179)calls.

Suggestions

  • generation

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)17 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)17 (5)of (6)25

Suggestions

  • 25.

syed

delete 'syed' by ''

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

yunos

replace 'yunos' by 'syed.'

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • syed.

“.

replace '“.' by 'Yaunos'

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • Yaunos

o

replace 'o' by '“.'

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • “.

st

replace 'st' by 'o'

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • o

=

replace '=' by 'st'

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • st

x

replace 'x' by '='

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • =

S

replace 'S' by 'x'

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • x

So

replace 'So' by 'S'

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • S

s

replace 's' by 'So'

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • So

S

replace 'S' by 's'

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • s

insert '' by 'S'

Happy suggestion

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.

(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed

Suggestions

  • S

'

Don’t put a space on both sides of a quote symbol.

Happy suggestion

T ' : SS S S s So S x = st o “. yunos syed

Suggestions

  • '
  • '

distribution

replace 'distribution' by 'distribution.'

Happy suggestion

(0)Relative (1)execution (2)time (3)distribution.

(0)Relative (1)execution (2)time (3)distribution

Suggestions

  • distribution.

syueLre,,

replace 'syueLre,,' by 'syueLre,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,'

Happy suggestion

(0)Yunoo (1)syueLre,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

(0)yunoo (1)syueLre,,

Suggestions

  • syueLre,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

yunoo

replace 'yunoo' by 'Yunoo'

Happy suggestion

(0)Yunoo (1)syueLre,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

(0)yunoo (1)syueLre,,

Suggestions

  • Yunoo

~

replace '~' by '.'

Happy suggestion

(0)200 (1).

(0)200 (1)~

Suggestions

  • .

distribution

replace 'distribution' by 'distribution.'

Happy suggestion

(0)Relative (1)machine (2)code (3)size (4)distribution.

(0)Relative (1)machine (2)code (3)size (4)distribution

Suggestions

  • distribution.

com-ponent

replace 'com-ponent' by 'component'

Happy suggestion

(0)We (1)have (2)identified (3)four (4)primary (5)factors (6)explaining (7)why (8)execution (9)traces (10)differ (11)overall. First, (12)alterations (13)to (14)the (15)binary (16)layout (17)inherently (18)impact (19)both (20)machine (21)code (22)instruction (23)traces (24)and (25)memory (26)accesses (27)within (28)the (29)program’s (30)stack. In (31)particular, (32)WASM-MUTATE (33)creates (34)variants (35)that (36)change (37)the (38)return (39)addresses (40)of (41)functions, (42)leading (43)to (44)divergent (45)execution (46)traces, (47)including (48)those (49)related (50)to (51)memory (52)access. Second, (53)our (54)rewriting (55)rules (56)incorporate (57)artificial (58)global (59)values (60)into (61)WebAssembly (62)binaries. Since (63)these (64)global (65)variables (66)are (67)inherently (68)manipulated (69)via (70)the (71)stack, (72)their (73)access (74)inevitably (75)generates (76)divergent (77)memory (78)traces. Third, (79)WASM-MUTATE (80)injects (81)*phantom’ (82)instructions (83)which (84)do (85)not (86)aim (87)to (88)modify (89)the (90)outcome (91)of (92)a (93)transformed (94)function (95)during (96)execution. These (97)intermediate (98)calculations (99)trigger (100)the (101)spill/reload (102)component (103)of (104)the (105)runtime, (106)varying (107)spill (108)and (109)reload (110)operations. In (111)the (112)context (113)of (114)limited (115)physical (116)resources, (117)these (118)operations (119)temporarily (120)store (121)values (122)in (123)memory (124)for (125)later (126)retrieval (127)and (128)use, (129)thus (130)creating (131)unique (132)memory (133)traces. Finally, (134)certain (135)rewriting (136)rules (137)implemented (138)by (139)WASM-MUTATE (140)replicate (141)fragments (142)of (143)code, (144)e.g., (145)performing (146)commutative (147)operations. These (148)code (149)segments (150)may (151)contain (152)memory (153)accesses, (154)and (155)while (156)neither (157)the (158)memory (159)addresses (160)nor (161)their (162)values (163)change, (164)the (165)frequency (166)of (167)these (168)operations (169)does. Overall, (170)these (171)findings (172)influence (173)the (174)diversity (175)of (176)execution (177)traces (178)among (179)the (180)generated (181)variants.

(0)We (1)have (2)identified (3)four (4)primary (5)factors (6)explaining (7)why (8)execution (9)traces (10)differ (11)overall. First, (12)alterations (13)to (14)the (15)binary (16)layout (17)inherently (18)impact (19)both (20)machine (21)code (22)instruction (23)traces (24)and (25)memory (26)accesses (27)within (28)the (29)program’s (30)stack. In (31)particular, (32)WASM-MUTATE (33)creates (34)variants (35)that (36)change (37)the (38)return (39)addresses (40)of (41)functions, (42)leading (43)to (44)divergent (45)execution (46)traces, (47)including (48)those (49)related (50)to (51)memory (52)access. Second, (53)our (54)rewriting (55)rules (56)incorporate (57)artificial (58)global (59)values (60)into (61)WebAssembly (62)binaries. Since (63)these (64)global (65)variables (66)are (67)inherently (68)manipulated (69)via (70)the (71)stack, (72)their (73)access (74)inevitably (75)generates (76)divergent (77)memory (78)traces. Third, (79)WASM-MUTATE (80)injects (81)*phantom’ (82)instructions (83)which (84)do (85)not (86)aim (87)to (88)modify (89)the (90)outcome (91)of (92)a (93)transformed (94)function (95)during (96)execution. (97)These (98)intermediate (99)calculations (100)trigger (101)the (102)spill/reload (103)com-ponent (104)of (105)the (106)runtime, (107)varying (108)spill (109)and (110)reload (111)operations. In (112)the (113)context (114)of (115)limited (116)physical (117)resources, (118)these (119)operations (120)temporarily (121)store (122)values (123)in (124)memory (125)for (126)later (127)retrieval (128)and (129)use, (130)thus (131)creating (132)unique (133)memory (134)traces. Finally, (135)certain (136)rewriting (137)rules (138)implemented (139)by (140)WASM-MUTATE (141)replicate (142)fragments (143)of (144)code, (145)e.g., (146)performing (147)commutative (148)operations. (149)These (150)code (151)segments (152)may (153)contain (154)memory (155)accesses, (156)and (157)while (158)neither (159)the (160)memory (161)addresses (162)nor (163)their (164)values (165)change, (166)the (167)frequency (168)of (169)these (170)operations (171)does. Overall, (172)these (173)findings (174)influence (175)the (176)diversity (177)of (178)execution (179)traces (180)among (181)the (182)generated (183)variants.

Suggestions

  • component

Unpaired symbol: ‘‘’ seems to be missing

Happy suggestion

We have identified four primary factors explaining why execution traces differ overall. First, alterations to the binary layout inherently impact both machine code instruction traces and memory accesses within the program’s stack. In particular, WASM-MUTATE creates variants that change the return addresses of functions, leading to divergent execution traces, including those related to memory access. Second, our rewriting rules incorporate artificial global values into WebAssembly binaries. Since these global variables are inherently manipulated via the stack, their access inevitably generates divergent memory traces. Third, WASM-MUTATE injects *phantom’ instructions which do not aim to modify the outcome of a transformed function during execution. These intermediate calculations trigger the spill/reload com-ponent of the runtime, varying spill and reload operations. In the context of limited physical resources, these operations temporarily store values in memory for later retrieval and use, thus creating unique memory traces. Finally, certain rewriting rules implemented by WASM-MUTATE replicate fragments of code, e.g., performing commutative operations. These code segments may contain memory accesses, and while neither the memory addresses nor their values change, the frequency of these operations does. Overall, these findings influence the diversity of execution traces among the generated variants.

Suggestions

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)18 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)18 (5)of (6)25

Suggestions

  • 25.

ret2spec

Possible typo detected.

Happy suggestion

For btb_breakout and btb_leakage, WASM-MUTATE demonstrates effectiveness, generating variants that leak less information than the original in 78% and 70% of the cases, respectively. For these particular binaries, a significant reduction in exfiltration bandwidth to zero is noted after 200 stacked transformations. This means that with a minimum of 200 stacked transformations, WASM-MUTATE can create variants that are completely resistant to the original attack. For the ret2spec and pht scenarios, the produced variants consistently exhibit lower bandwidth than the original in 76% and 71% of instances, respectively. As depicted in the plots, the exfiltration bandwidth diminishes following the application of at least 100 stacked transformations.

Suggestions

  • respect
  • retype
  • retyped
  • retypes

ret2spec

Possible typo detected.

Happy suggestion

Figure 10 offers a graphical representation of WASM-MUTATE’s influence on the Swivel original programs and their attacks. Each plot corresponds to one original Web-Assembly binary and the attack it undergoes: btb_breakout, btb_leakage, ret2spec, and pht. The Y-axis represents the exfiltration bandwidth (see Metric 6). The bandwidth of the original binary under attack is marked as a blue dashed horizontal line. In each plot, the variants are grouped in clusters of 100 stacked transformations. These are indicated by green dots and lines. The dot signifies the median bandwidth for the cluster, while the line represents the interquartile range of the group’s bandwidth.

Suggestions

  • respect
  • retype
  • retyped
  • retypes

9

replace '9' by '9,'

Happy suggestion

(0)In (1)Figure (2)9, (3)we (4)show (5)the (6)distribution (7)of (8)relative (9)execution (10)times (11)for (12)variants (13)produced (14)by (15)WASM-MUTATE. The (16)Y-axis (17)represents (18)the (19)count (20)of (21)variants, (22)while (23)the (24)X-axis (25)represents (26)the (27)relative (28)value (29)of (30)the (31)relative (32)execution (33)time (34)size. The (35)median (36)relative (37)execution (38)time (39)is (40)1.1. Overall, (41)we (42)observe (43)a (44)Gaussian-like (45)shape. We (46)note (47)that (48)29% (49)of (50)the (51)variants (52)perform (53)faster (54)than (55)the (56)original, (57)in (58)contrast (59)to (60)70% (61)that (62)are (63)slightly (64)slower. In (65)the (66)worst-case (67)scenario, (68)WASM-MUTATE (69)produces (70)variants (71)that (72)perform (73)twice (74)as (75)slowly (76)as (77)the (78)original. On (79)the (80)other (81)hand, (82)in (83)the (84)best-case (85)scenario, (86)WASM-MUTATE (87)produces (88)variants (89)that (90)are (91)five (92)times (93)faster (94)than (95)the (96)original. We (97)have (98)identified (99)two (100)primary (101)reasons (102)for (103)the (104)minimal (105)impact (106)of (107)WASM-MUTATE (108)on (109)variant (110)execution (111)times. First, (112)WASM-MUTATE (113)generates (114)variants (115)by (116)injecting (117)phantom (118)code (119)which, (120)in (121)practice, (122)is (123)not (124)executed. This (125)impacts (126)the (127)machine (128)code (129)size, (130)but (131)not (132)the (133)execution (134)time. Second, (135)WASM-MUTATE (136)produces (137)variants (138)by (139)optimizing (140)the (141)original (142)programs, (143)in (144)particular, (145)due (146)to (147)peep-hole (148)diversification (149)techniques. This (150)allows (151)for (152)the (153)generation (154)of (155)faster (156)variants (157)through (158)the (159)stacking (160)of (161)optimizations (162)during (163)the (164)e-graph (165)traversal (166)by (167)WASM-MUTATE.

(0)In (1)Figure (2)9 (3)we (4)show (5)the (6)distribution (7)of (8)relative (9)execution (10)times (11)for (12)variants (13)produced (14)by (15)WASM-MUTATE. The (16)Y-axis (17)represents (18)the (19)count (20)of (21)variants, (22)while (23)the (24)X-axis (25)represents (26)the (27)relative (28)value (29)of (30)the (31)relative (32)execution (33)time (34)size. The (35)median (36)relative (37)execution (38)time (39)is (40)1.1. Overall, (41)we (42)observe (43)a (44)Gaussian-like (45)shape. We (46)note (47)that (48)29% (49)of (50)the (51)variants (52)perform (53)faster (54)than (55)the (56)original, (57)in (58)contrast (59)to (60)70% (61)that (62)are (63)slightly (64)slower. In (65)the (66)worst-case (67)scenario, (68)WASM-MUTATE (69)produces (70)variants (71)that (72)perform (73)twice (74)as (75)slowly (76)as (77)the (78)original. On (79)the (80)other (81)hand, (82)in (83)the (84)best-case (85)scenario, (86)WASM-MUTATE (87)produces (88)variants (89)that (90)are (91)five (92)times (93)faster (94)than (95)the (96)original. We (97)have (98)identified (99)two (100)primary (101)reasons (102)for (103)the (104)minimal (105)impact (106)of (107)WASM-MUTATE (108)on (109)variant (110)execution (111)times. First, (112)WASM-MUTATE (113)generates (114)variants (115)by (116)injecting (117)phantom (118)code (119)which, (120)in (121)practice, (122)is (123)not (124)executed. This (125)impacts (126)the (127)machine (128)code (129)size, (130)but (131)not (132)the (133)execution (134)time. Second, (135)WASM-MUTATE (136)produces (137)variants (138)by (139)optimizing (140)the (141)original (142)programs, (143)in (144)particular, (145)due (146)to (147)peep-hole (148)diversification (149)techniques. This (150)allows (151)for (152)the (153)generation (154)of (155)faster (156)variants (157)through (158)the (159)stacking (160)of (161)optimizations (162)during (163)the (164)e-graph (165)traversal (166)by (167)WASM-MUTATE.

Suggestions

  • 9,

Swivel’s

replace 'Swivel’s' by 'Swivel's'

Happy suggestion

(0)Figure (1)10: (2)Visual (3)representation (4)of (5)WASM-MUTATE's (6)impact (7)on (8)Swivel's (9)original (10)programs. The (11)Y-axis (12)denotes (13)exfiltration (14)bandwidth, (15)with (16)the (17)original (18)binary’s (19)bandwidth (20)under (21)attack (22)highlighted (23)by (24)a (25)blue (26)marker (27)and (28)dashed (29)line. Variants (30)are (31)clustered (32)in (33)groups (34)of (35)100 (36)stacked (37)transformations, (38)denoted (39)by (40)green (41)dots (42)(median (43)bandwidth) (44)and (45)lines (46)(interquartile (47)bandwidth (48)range). Overall, (49)for (50)all (51)100000 (52)variants (53)generated (54)out (55)of (56)each (57)original (58)program, (59)70% (60)have (61)less (62)data (63)leakage (64)bandwidth.

(0)Figure (1)10: (2)Visual (3)representation (4)of (5)WASM-MUTATE's (6)impact (7)on (8)Swivel’s (9)original (10)programs. The (11)Y-axis (12)denotes (13)exfiltration (14)bandwidth, (15)with (16)the (17)original (18)binary’s (19)bandwidth (20)under (21)attack (22)highlighted (23)by (24)a (25)blue (26)marker (27)and (28)dashed (29)line. Variants (30)are (31)clustered (32)in (33)groups (34)of (35)100 (36)stacked (37)transformations, (38)denoted (39)by (40)green (41)dots (42)(median (43)bandwidth) (44)and (45)lines (46)(interquartile (47)bandwidth (48)range). (49)Overall, (50)for (51)all (52)100000 (53)variants (54)generated (55)out (56)of (57)each (58)original (59)program, (60)70% (61)have (62)less (63)data (64)leakage (65)bandwidth.

Suggestions

  • Swivel's

transformations

replace 'transformations' by 'transformations.'

Happy suggestion

(0)(s/q) (1)Tapimpueg, (2)Stacked (3)transformations.

(0)(s/q) (1)Tapimpueg, (2)Stacked (3)transformations

Suggestions

  • transformations.

(s

The word ‘(s’ is not standard English. Did you mean “’s” (curly apostrophe) or “'s” (straight apostrophe)?

Happy suggestion

(s/q) Tapimpueg, Stacked transformations

Suggestions

  • ’s
  • 's

transformations

replace 'transformations' by 'transformations.'

Happy suggestion

(0)0.03 (1)a (2)So (3)Ss (4)(s/q) (5)Waprapueg (6)0.02 (7)0.00 (8)Stacked (9)transformations.

(0)0.03 (1)a (2)So (3)Ss (4)(s/q) (5)Waprapueg (6)0.02 (7)0.00 (8)Stacked (9)transformations

Suggestions

  • transformations.

transformations

delete 'transformations' by ''

Happy suggestion

(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.

(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations

Suggestions

Stacked

delete 'Stacked' by ''

Happy suggestion

(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.

(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations

Suggestions

0.0

replace '0.0' by 'transformations.'

Happy suggestion

(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.

(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations

Suggestions

  • transformations.

S

replace 'S' by 'Stacked'

Happy suggestion

(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.

(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations

Suggestions

  • Stacked

a

replace 'a' by '0.0'

Happy suggestion

(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.

(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations

Suggestions

  • 0.0

Tpmpueg

replace 'Tpmpueg' by 'S'

Happy suggestion

(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.

(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations

Suggestions

  • S

(s/q)

replace '(s/q)' by 'a'

Happy suggestion

(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.

(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations

Suggestions

  • a

Ss

replace 'Ss' by 'Tpmpueg'

Happy suggestion

(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.

(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations

Suggestions

  • Tpmpueg

~~

replace '~~' by '(s/q)'

Happy suggestion

(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.

(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations

Suggestions

  • (s/q)

insert '' by 'Ss'

Happy suggestion

(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.

(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations

Suggestions

  • Ss

transformations

replace 'transformations' by 'transformations.'

Happy suggestion

(0)btb_leakage (1)Se (2)S (3)o (4)* (5)a (6)= (7)(s/q) (8)Waprnpueg (9)Stacked (10)transformations.

(0)btb_leakage (1)Se (2)S (3)o (4)* (5)a (6)= (7)(s/q) (8)Waprnpueg (9)Stacked (10)transformations

Suggestions

  • transformations.

btb

This sentence does not start with an uppercase letter.

Happy suggestion

btb_leakage Se S o * a = (s/q) Waprnpueg Stacked transformations

Suggestions

  • Btb

insert '' by 'it.'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • it.

insert '' by 'for'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • for

insert '' by 'need'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • need

insert '' by 'a'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • a

insert '' by 'is'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • is

insert '' by 'there'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • there

insert '' by 'not'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • not

insert '' by 'or'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • or

insert '' by 'whether'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • whether

insert '' by 'of'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • of

insert '' by 'question'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • question

insert '' by 'the'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • the

insert '' by 'Then'

Happy suggestion

(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.

(0)

Suggestions

  • Then

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)19 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)19 (5)of (6)25

Suggestions

  • 25.

optimization

replace 'optimization' by 'optimization.'

Happy suggestion

(0)Just (1)prevent (2)optimization.

(0)just (1)prevent (2)optimization

Suggestions

  • optimization.

just

replace 'just' by 'Just'

Happy suggestion

(0)Just (1)prevent (2)optimization.

(0)just (1)prevent (2)optimization

Suggestions

  • Just

replace '

Happy suggestion

(0)Variant (1)code (2)(call (3)$readTimer) (4)(set_local (5)$end_time) (6)inserted (7)instructions>. Access (8)to (9)mem (10)inserted (11)instructions> (12)(i64.sub (13)(get_local (14)$end_time) (15)(get_local (16)$start_time)) (17)(set_local (18)$duration) (19)Listing (20)8: (21)Variant (22)of (23)btb_breakout (24)with (25)more (26)instructions (27)added (28)in (29)between (30)time (31)measurement.

(0)Variant (1)code (2)(call (3)$readTimer) (4)(set_local (5)$end_time) (6). access (8)to (9)mem (10) (12)(i64.sub (13)(get_local (14)$end_time) (15)(get_local (16)$start_time)) (17)(set_local (18)$duration) (19)Listing (20)8: (21)Variant (22)of (23)btb_breakout (24)with (25)more (26)instructions (27)added (28)in (29)between (30)time (31)measurement.

Suggestions

  • inserted

access

replace 'access' by 'Access'

Happy suggestion

(0)Variant (1)code (2)(call (3)$readTimer) (4)(set_local (5)$end_time) (6)inserted (7)instructions>. Access (8)to (9)mem (10)inserted (11)instructions> (12)(i64.sub (13)(get_local (14)$end_time) (15)(get_local (16)$start_time)) (17)(set_local (18)$duration) (19)Listing (20)8: (21)Variant (22)of (23)btb_breakout (24)with (25)more (26)instructions (27)added (28)in (29)between (30)time (31)measurement.

(0)Variant (1)code (2)(call (3)$readTimer) (4)(set_local (5)$end_time) (6). access (8)to (9)mem (10) (12)(i64.sub (13)(get_local (14)$end_time) (15)(get_local (16)$start_time)) (17)(set_local (18)$duration) (19)Listing (20)8: (21)Variant (22)of (23)btb_breakout (24)with (25)more (26)instructions (27)added (28)in (29)between (30)time (31)measurement.

Suggestions

  • Access

access

This sentence does not start with an uppercase letter.

Happy suggestion

Variant code (call $readTimer) (set_local $end_time) . access to mem (i64.sub (get_local $end_time) (get_local $start_time)) (set_local $duration) Listing 8: Variant of btb_breakout with more instructions added in between time measurement.

Suggestions

  • Access

secret

replace 'secret' by 'secret.'

Happy suggestion

(0)"S"(83) (1)is (2)the (3)secret.

(0)"S"(83) (1)is (2)the (3)secret

Suggestions

  • secret.

"S

The word ‘"S’ is not standard English. Did you mean “’S” (curly apostrophe) or “'S” (straight apostrophe)?

Happy suggestion

"S"(83) is the secret

Suggestions

  • ’S
  • 'S

places.

delete 'places.' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

jump

delete 'jump' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

between

delete 'between' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

indindinctly

delete 'indindinctly' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

added

delete 'added' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

instructions

delete 'instructions' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

more

delete 'more' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

with

delete 'with' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

btb_breakout

delete 'btb_breakout' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

of

delete 'of' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

Variant

delete 'Variant' by ''

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

replace '

Happy suggestion

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:

(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10) (12)(132.load (13)(i32.const (14)2000)) (15) (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26) (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35) (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10: (45)Variant (46)of (47)btb_breakout (48)with (49)more (50)instructions (51)added (52)indindinctly (53)between (54)jump (55)places.

Suggestions

  • inserted

access

replace 'access' by 'Access'

Happy suggestion

(0)Code (1)from (2)original (3)btb_breakout (4)(call (5)$readTimer) (6)(set_local (7)$end_time). Access (8)to (9)mem (10)(i64.sub (11)(get_local (12)$end_time) (13)(get_local (14)$start_time)) (15)(set_local (16)$duration) (17)Listing (18)7: (19)Wasm (20)timer (21)used (22)in (23)btb_breakout (24)program.

(0)Code (1)from (2)original (3)btb_breakout (4)(call (5)$readTimer) (6)(set_local (7)$end_time). access (8)to (9)mem (10)(i64.sub (11)(get_local (12)$end_time) (13)(get_local (14)$start_time)) (15)(set_local (16)$duration) (17)Listing (18)7: (19)Wasm (20)timer (21)used (22)in (23)btb_breakout (24)program.

Suggestions

  • Access

access

This sentence does not start with an uppercase letter.

Happy suggestion

Code from original btb_breakout (call $readTimer) (set_local $end_time). access to mem (i64.sub (get_local $end_time) (get_local $start_time)) (set_local $duration) Listing 7: Wasm timer used in btb_breakout program.

Suggestions

  • Access

com-ponent

replace 'com-ponent' by 'component'

Happy suggestion

(0)Many (1)attacks (2)rely (3)on (4)a (5)timer (6)component (7)to (8)measure (9)cache (10)access (11)time (12)for (13)memory, (14)and (15)disrupting (16)this (17)component (18)effectively (19)impairs (20)the (21)attack’s (22)effectiveness. This (23)strategy (24)of (25)dynamic (26)alteration (27)has (28)also (29)been (30)employed (31)in (32)other (33)scenarios. For (34)instance, (35)to (36)counter (37)potential (38)timing (39)attacks, (40)Firefox (41)randomizes (42)its (43)built-in (44)JavaScript (45)timer (46)[44]. WASM-MUTATE (47)applies (48)the (49)same (50)strategy (51)by (52)interspersing (53)instructions (54)within (55)the (56)timing (57)steps (58)of (59)WebAssembly (60)variants. In (61)Listing (62)7 (63)and (64)Listing (65)8, (66)we (67)demonstrate (68)WASM-MUTATE’s (69)impact (70)on (71)time (72)measurements. The (73)former (74)illustrates (75)the (76)original (77)time (78)measurement, (79)while (80)the (81)latter (82)presents (83)a (84)variant (85)with (86)WASM-MUTATE-inserted (87)operations (88)amid (89)the (90)timing.

(0)Many (1)attacks (2)rely (3)on (4)a (5)timer (6)component (7)to (8)measure (9)cache (10)access (11)time (12)for (13)memory, (14)and (15)disrupting (16)this (17)com-ponent (18)effectively (19)impairs (20)the (21)attack’s (22)effectiveness. This (23)strategy (24)of (25)dynamic (26)alteration (27)has (28)also (29)been (30)employed (31)in (32)other (33)scenarios. For (34)instance, (35)to (36)counter (37)potential (38)timing (39)attacks, (40)Firefox (41)randomizes (42)its (43)built-in (44)JavaScript (45)timer (46)[44]. (47)WASM-MUTATE (48)applies (49)the (50)same (51)strategy (52)by (53)interspersing (54)instructions (55)within (56)the (57)timing (58)steps (59)of (60)WebAssembly (61)variants. In (62)Listing (63)7 (64)and (65)Listing (66)8, (67)we (68)demonstrate (69)WASM-MUTATE’s (70)impact (71)on (72)time (73)measurements. The (74)former (75)illustrates (76)the (77)original (78)time (79)measurement, (80)while (81)the (82)latter (83)presents (84)a (85)variant (86)with (87)WASM-MUTATE-inserted (88)operations (89)amid (90)the (91)timing.

Suggestions

  • component

ac-cesses.

replace 'ac-cesses.' by 'cycles.'

Happy suggestion

(0)This (1)success (2)is (3)explained (4)by (5)the (6)fact (7)that (8)WASM-MUTATE (9)synthesizes (10)variants (11)that (12)effectively (13)alter (14)memory (15)access (16)patterns. Specifically, (17)it (18)does (19)so (20)by (21)amplifying (22)spill/reload (23)operations, (24)injecting (25)artificial (26)global (27)variables, (28)and (29)changing (30)the (31)frequency (32)of (33)pre-existing (34)memory (35)cycles. These (36)transformations (37)influence (38)the (39)WebAssembly (40)program’s (41)memory, (42)disrupting (43)cache (44)predictors.

(0)This (1)success (2)is (3)explained (4)by (5)the (6)fact (7)that (8)WASM-MUTATE (9)synthesizes (10)variants (11)that (12)effectively (13)alter (14)memory (15)access (16)patterns. Specifically, (17)it (18)does (19)so (20)by (21)amplifying (22)spill/reload (23)operations, (24)injecting (25)artificial (26)global (27)variables, (28)and (29)changing (30)the (31)frequency (32)of (33)pre-existing (34)memory (35)ac-cesses. These (36)transformations (37)influence (38)the (39)WebAssembly (40)program’s (41)memory, (42)disrupting (43)cache (44)predictors.

Suggestions

  • cycles.

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)20 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)20 (5)of (6)25

Suggestions

  • 25.

ret2spec

Possible typo detected.

Happy suggestion

Answer to RQ4: Software diversification is effective at synthesizing WebAssembly binaries that mitigate Spectre-like attacks. WASM-MUTATE generates vari-ants of btb_breakout and btb_leakage that are protected against the considered attack. For ret2spec and pht, it generates hardened variants that are more resilient to the attack than the original program: 70% of the diversified variants exhibit reduced attack effectiveness (reduced data leakage bandwidth) compared to the original program.

Suggestions

  • respect
  • retype
  • retyped
  • retypes

ret2spec

Possible typo detected.

Happy suggestion

Finally, for ret2spec and pht, both programs are hardened with attack bandwidth reduction, but this does not materialize in a short-term timeframe (low count of stacked transformations). Furthermore, the exfiltration bandwidth is more dispersed for these two programs. Our analysis indicates a correlation between bandwidth reduction and the complexity of the binary subject to diversification. Ret2spec and pht are considerably larger than btb_breakout and btb_leakage. The former comprises more than 300k instructions, while the latter two include fewer than 800 instructions. Given that WASM-MUTATE applies precise, fine-grained transformations one at a time, the likelihood of impacting critical attack components, such as timing memory accesses, diminishes for larger binaries, particularly when limited to 1,000 transformations. Based on these observations, we believe that a greater number of stacked transformations would further contribute to eventually eliminating the attacks associated with ret2spec and pht.

Suggestions

  • respect
  • retype
  • retyped
  • retypes

insert '' by 'everyone.'

Happy suggestion

(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.

(0)6. Discussion

Suggestions

  • everyone.

insert '' by 'to'

Happy suggestion

(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.

(0)6. Discussion

Suggestions

  • to

insert '' by 'open'

Happy suggestion

(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.

(0)6. Discussion

Suggestions

  • open

insert '' by 'is'

Happy suggestion

(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.

(0)6. Discussion

Suggestions

  • is

insert '' by 'topic'

Happy suggestion

(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.

(0)6. Discussion

Suggestions

  • topic

insert '' by 'this'

Happy suggestion

(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.

(0)6. Discussion

Suggestions

  • this

insert '' by 'on'

Happy suggestion

(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.

(0)6. Discussion

Suggestions

  • on

[8],

replace '[8],' by '[8,],'

Happy suggestion

(0)First, (1)as (2)emphasized (3)in (4)prior (5)applications (6)of (7)WASM-MUTATE (8)[8,], (9)uncontrolled (10)diversification (11)can (12)be (13)counter-productive (14)if (15)a (16)specific (17)objective, (18)such (19)as (20)a (21)cost (22)function, (23)is (24)not (25)established (26)at (27)the (28)beginning (29)of (30)the (31)diversification (32)process. Secondly, (33)while (34)some (35)transformations (36)yield (37)distinct (38)WebAssembly (39)binaries, (40)their (41)compilation (42)produces (43)identical (44)machine (45)code. Transformations (46)that (47)are (48)not (49)preserved (50)undermine (51)the (52)effectiveness (53)of (54)diversification. For (55)example, (56)incorporating (57)random (58)nop (59)operations (60)directly (61)into (62)WebAssembly (63)does (64)not (65)modify (66)the (67)final (68)machine (69)code (70)as (71)the (72)nop (73)operations (74)are (75)often (76)removed (77)by (78)the (79)compiler. The (80)same (81)phenomenon (82)is (83)observed (84)with (85)transformations (86)to (87)custom (88)sections (89)of (90)WebAssembly (91)binaries. Additionally, (92)it (93)is (94)important (95)to (96)note (97)that (98)transformed (99)code (100)doesn’t (101)always (102)execute, (103)i.e., (104)WASM-MUTATE (105)may (106)generate (107)dead (108)code.

(0)First, (1)as (2)emphasized (3)in (4)prior (5)applications (6)of (7)WASM-MUTATE (8)[8], (9)uncontrolled (10)diversification (11)can (12)be (13)counter-productive (14)if (15)a (16)specific (17)objective, (18)such (19)as (20)a (21)cost (22)function, (23)is (24)not (25)established (26)at (27)the (28)beginning (29)of (30)the (31)diversification (32)process. Secondly, (33)while (34)some (35)transformations (36)yield (37)distinct (38)WebAssembly (39)binaries, (40)their (41)compilation (42)produces (43)identical (44)machine (45)code. Transformations (46)that (47)are (48)not (49)preserved (50)undermine (51)the (52)effectiveness (53)of (54)diversification. (55)For (56)example, (57)incorporating (58)random (59)nop (60)operations (61)directly (62)into (63)WebAssembly (64)does (65)not (66)modify (67)the (68)final (69)machine (70)code (71)as (72)the (73)nop (74)operations (75)are (76)often (77)removed (78)by (79)the (80)compiler. (81)The (82)same (83)phenomenon (84)is (85)observed (86)with (87)transformations (88)to (89)custom (90)sections (91)of (92)WebAssembly (93)binaries. Additionally, (94)it (95)is (96)important (97)to (98)note (99)that (100)transformed (101)code (102)doesn’t (103)always (104)execute, (105)i.e., (106)WASM-MUTATE (107)may (108)generate (109)dead (110)code.

Suggestions

  • [8,],

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)21 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)21 (5)of (6)25

Suggestions

  • 25.

insert '' by 'from'

Happy suggestion

(0)Static (1)software (2)diversification (3)refers (4)to (5)the (6)process (7)of (8)synthesizing, (9)and (10)distributing (11)unique (12)but (13)functionally (14)equivalent (15)programs (16)to (17)end (18)users. The (19)implementation (20)of (21)this (22)process (23)can (24)take (25)place (26)at (27)any (28)stage (29)of (30)software (31)development (32)and (33)deployment (34)- (35)from (36)the (37)inception (38)of (39)source (40)code, (41)through (42)the (43)compilation (44)phase, (45)to (46)the (47)execution (48)of (49)the (50)final (51)binary (52)[26, (53)36]. WASM-MUTATE, (54)a (55)static (56)diversifier, (57)can (58)be (59)placed (60)at (61)the (62)final (63)stage, (64)keeping (65)in (66)mind (67)that (68)the (69)code (70)will (71)subsequently (72)undergo (73)final (74)compilation (75)by (76)JIT (77)compilers. The (78)concept (79)of (80)software (81)diversification (82)owes (83)much (84)to (85)the (86)pioneering (87)work (88)of (89)Cohen (90)[13]. His (91)suite (92)of (93)code (94)transformations (95)aimed (96)to (97)increase (98)complexity (99)and (100)thereby (101)enhance (102)the (103)difficulty (104)of (105)executing (106)a (107)successful (108)attack (109)against (110)a (111)broad (112)user (113)base (114)[13]. WASM-MUTATE’s (115)rewriting (116)rules (117)draw (118)significantly (119)from (120)Cohen (121)and (122)Forrest’s (123)seminal (124)contributions (125)[13, (126)21].

(0)Static (1)software (2)diversification (3)refers (4)to (5)the (6)process (7)of (8)synthesizing, (9)and (10)distributing (11)unique (12)but (13)functionally (14)equivalent (15)programs (16)to (17)end (18)users. The (19)implementation (20)of (21)this (22)process (23)can (24)take (25)place (26)at (27)any (28)stage (29)of (30)software (31)development (32)and (33)deployment (34)-from (35)the (36)inception (37)of (38)source (39)code, (40)through (41)the (42)compilation (43)phase, (44)to (45)the (46)execution (47)of (48)the (49)final (50)binary (51)[26, (52)36]. WASM-MUTATE, (53)a (54)static (55)diversifier, (56)can (57)be (58)placed (59)at (60)the (61)final (62)stage, (63)keeping (64)in (65)mind (66)that (67)the (68)code (69)will (70)subsequently (71)undergo (72)final (73)compilation (74)by (75)JIT (76)compilers. The (77)concept (78)of (79)software (80)diversification (81)owes (82)much (83)to (84)the (85)pioneering (86)work (87)of (88)Cohen (89)[13]. His (90)suite (91)of (92)code (93)transformations (94)aimed (95)to (96)increase (97)complexity (98)and (99)thereby (100)enhance (101)the (102)difficulty (103)of (104)executing (105)a (106)successful (107)attack (108)against (109)a (110)broad (111)user (112)base (113)[13]. WASM-MUTATE’s (114)rewriting (115)rules (116)draw (117)significantly (118)from (119)Cohen (120)and (121)Forrest’s (122)seminal (123)contributions (124)[13, (125)21].

Suggestions

  • from

-from

replace '-from' by '-'

Happy suggestion

(0)Static (1)software (2)diversification (3)refers (4)to (5)the (6)process (7)of (8)synthesizing, (9)and (10)distributing (11)unique (12)but (13)functionally (14)equivalent (15)programs (16)to (17)end (18)users. The (19)implementation (20)of (21)this (22)process (23)can (24)take (25)place (26)at (27)any (28)stage (29)of (30)software (31)development (32)and (33)deployment (34)- (35)from (36)the (37)inception (38)of (39)source (40)code, (41)through (42)the (43)compilation (44)phase, (45)to (46)the (47)execution (48)of (49)the (50)final (51)binary (52)[26, (53)36]. WASM-MUTATE, (54)a (55)static (56)diversifier, (57)can (58)be (59)placed (60)at (61)the (62)final (63)stage, (64)keeping (65)in (66)mind (67)that (68)the (69)code (70)will (71)subsequently (72)undergo (73)final (74)compilation (75)by (76)JIT (77)compilers. The (78)concept (79)of (80)software (81)diversification (82)owes (83)much (84)to (85)the (86)pioneering (87)work (88)of (89)Cohen (90)[13]. His (91)suite (92)of (93)code (94)transformations (95)aimed (96)to (97)increase (98)complexity (99)and (100)thereby (101)enhance (102)the (103)difficulty (104)of (105)executing (106)a (107)successful (108)attack (109)against (110)a (111)broad (112)user (113)base (114)[13]. WASM-MUTATE’s (115)rewriting (116)rules (117)draw (118)significantly (119)from (120)Cohen (121)and (122)Forrest’s (123)seminal (124)contributions (125)[13, (126)21].

(0)Static (1)software (2)diversification (3)refers (4)to (5)the (6)process (7)of (8)synthesizing, (9)and (10)distributing (11)unique (12)but (13)functionally (14)equivalent (15)programs (16)to (17)end (18)users. The (19)implementation (20)of (21)this (22)process (23)can (24)take (25)place (26)at (27)any (28)stage (29)of (30)software (31)development (32)and (33)deployment (34)-from (35)the (36)inception (37)of (38)source (39)code, (40)through (41)the (42)compilation (43)phase, (44)to (45)the (46)execution (47)of (48)the (49)final (50)binary (51)[26, (52)36]. WASM-MUTATE, (53)a (54)static (55)diversifier, (56)can (57)be (58)placed (59)at (60)the (61)final (62)stage, (63)keeping (64)in (65)mind (66)that (67)the (68)code (69)will (70)subsequently (71)undergo (72)final (73)compilation (74)by (75)JIT (76)compilers. The (77)concept (78)of (79)software (80)diversification (81)owes (82)much (83)to (84)the (85)pioneering (86)work (87)of (88)Cohen (89)[13]. His (90)suite (91)of (92)code (93)transformations (94)aimed (95)to (96)increase (97)complexity (98)and (99)thereby (100)enhance (101)the (102)difficulty (103)of (104)executing (105)a (106)successful (107)attack (108)against (109)a (110)broad (111)user (112)base (113)[13]. WASM-MUTATE’s (114)rewriting (115)rules (116)draw (117)significantly (118)from (119)Cohen (120)and (121)Forrest’s (122)seminal (123)contributions (124)[13, (125)21].

Suggestions

  • -

Work

delete 'Work' by ''

Happy suggestion

(0)7. Related (1)Work (2)Related (3)Work (4)Related (5)Work (6)Related (7)Work (8)Related (9)Work (10)Related (11)Work (12)Related (13)Work (14)Related (15)Work (16)Related (17)Work (18)Related (19)Work (20)Related (21)Work (22)Related (23)Work (24)Related (25)Work (26)Related (27)Work (28)Related (29)Work (30)Related (31)Work (32)Related (33)Work (34)Related (35)Work (36)Related (37)Work (38)Related (39)Work (40)Related (41)Work (42)Related (43)Work (44)Related (45)Work (46)Related (47)Work (48)Related (49)Work (50)Related (51)Work (52)Related (53)Work (54)Related (55)Work (56)Related (57)Work (58)Related (59)Work (60)Related (61)Work (62)Related (63)Work (64)Related (65)Work (66)Related (67)Work (68)Related (69)Work (70)Related (71)Work (72)Related (73)Work (74)Related (75)Work (76)Related (77)Work (78)Related (79)Work (80)Related (81)Work (82)Related (83)Work (84)Related (85)Work (86)Related (87)Work (88)Related (89)Work (90)Related (91)Work (92)Related (93)Work (94)Related (95)Work (96)Related (97)Work (98)Related (99)Work (100)Related (101)Work (102)Related (103)Work (104)Related (105)Work (106)Related (107)Work (108)Related (109)Work (110)Related (111)Work (112)Related

(0)7. Related (1)Work

Suggestions

insert '' by 'Work'

Happy suggestion

(0)7. Related (1)Work (2)Related (3)Work (4)Related (5)Work (6)Related (7)Work (8)Related (9)Work (10)Related (11)Work (12)Related (13)Work (14)Related (15)Work (16)Related (17)Work (18)Related (19)Work (20)Related (21)Work (22)Related (23)Work (24)Related (25)Work (26)Related (27)Work (28)Related (29)Work (30)Related (31)Work (32)Related (33)Work (34)Related (35)Work (36)Related (37)Work (38)Related (39)Work (40)Related (41)Work (42)Related (43)Work (44)Related (45)Work (46)Related (47)Work (48)Related (49)Work (50)Related (51)Work (52)Related (53)Work (54)Related (55)Work (56)Related (57)Work (58)Related (59)Work (60)Related (61)Work (62)Related (63)Work (64)Related (65)Work (66)Related (67)Work (68)Related (69)Work (70)Related (71)Work (72)Related (73)Work (74)Related (75)Work (76)Related (77)Work (78)Related (79)Work (80)Related (81)Work (82)Related (83)Work (84)Related (85)Work (86)Related (87)Work (88)Related (89)Work (90)Related (91)Work (92)Related (93)Work (94)Related (95)Work (96)Related (97)Work (98)Related (99)Work (100)Related (101)Work (102)Related (103)Work (104)Related (105)Work (106)Related (107)Work (108)Related (109)Work (110)Related (111)Work (112)Related

(0)7. Related (1)Work

Suggestions

  • Work

insert '' by 'Related'

Happy suggestion

(0)7. Related (1)Work (2)Related (3)Work (4)Related (5)Work (6)Related (7)Work (8)Related (9)Work (10)Related (11)Work (12)Related (13)Work (14)Related (15)Work (16)Related (17)Work (18)Related (19)Work (20)Related (21)Work (22)Related (23)Work (24)Related (25)Work (26)Related (27)Work (28)Related (29)Work (30)Related (31)Work (32)Related (33)Work (34)Related (35)Work (36)Related (37)Work (38)Related (39)Work (40)Related (41)Work (42)Related (43)Work (44)Related (45)Work (46)Related (47)Work (48)Related (49)Work (50)Related (51)Work (52)Related (53)Work (54)Related (55)Work (56)Related (57)Work (58)Related (59)Work (60)Related (61)Work (62)Related (63)Work (64)Related (65)Work (66)Related (67)Work (68)Related (69)Work (70)Related (71)Work (72)Related (73)Work (74)Related (75)Work (76)Related (77)Work (78)Related (79)Work (80)Related (81)Work (82)Related (83)Work (84)Related (85)Work (86)Related (87)Work (88)Related (89)Work (90)Related (91)Work (92)Related (93)Work (94)Related (95)Work (96)Related (97)Work (98)Related (99)Work (100)Related (101)Work (102)Related (103)Work (104)Related (105)Work (106)Related (107)Work (108)Related (109)Work (110)Related (111)Work (112)Related

(0)7. Related (1)Work

Suggestions

  • Related

implementa-tion

replace 'implementa-tion' by 'implementation'

Happy suggestion

(0)Jackson (1)and (2)colleagues (3)proposed (4)the (5)pivotal (6)role (7)of (8)the (9)compiler (10)in (11)promoting (12)static (13)software (14)diversification (15)[26]. Within (16)the (17)WebAssembly (18)context, (19)CROW (20)is (21)the (22)only (23)existing (24)compiler-based (25)diversifier (26)[1]. It (27)is (28)recognized (29)as (30)a (31)superdiversifier (32)for (33)WebAssembly, (34)built (35)within (36)the (37)LLVM (38)compilation (39)toolchain (40)[27]. However, (41)the (42)direct (43)integration (44)of (45)the (46)diversifier (47)into (48)the (49)LLVM (50)compiler (51)restricts (52)its (53)applicability (54)to (55)WebAssembly (56)binaries (57)generated (58)through (59)LLVM. This (60)limitation (61)implies (62)that (63)WebAssembly (64)source (65)code (66)without (67)an (68)LLVM (69)frontend (70)implementation (71)cannot (72)leverage (73)CROW’s (74)capabilities. Conversely, (75)WASM-MUTATE (76)provides (77)a (78)more (79)adaptable (80)and (81)expedited (82)WebAssembly (83)to (84)WebAssembly (85)diversification (86)solution, (87)ensuring (88)compatibility (89)with (90)any (91)compiler. Additionally, (92)unlike (93)CROW, (94)WASM-MUTATE (95)does (96)not (97)depend (98)on (99)an (100)SMT (101)solver (102)to (103)validate (104)the (105)generated (106)variants. It (107)instead (108)guarantees (109)semantic (110)equivalence (111)by (112)design, (113)leading (114)to (115)increased (116)efficiency (117)in (118)generating (119)WebAssembly (120)variants, (121)as (122)discussed (123)in (124)subsection (125)5.1. Consequently, (126)CROW (127)seems (128)to (129)provide (130)variants (131)that (132)are (133)more (134)resilient (135)to (136)further (137)compiler (138)optimizations. WASM-MUTATE (139)trades (140)off (141)the (142)preservation (143)of (144)generated (145)variants (146)to (147)create (148)more (149)variants. According (150)to (151)CROW (152)reports, (153)WASM-MUTATE (154)generates (155)more (156)variants (157)by (158)at (159)least (160)one (161)order (162)of (163)magnitude (164)in (165)the (166)same (167)amount (168)of (169)time. Overall, (170)as (171)a (172)WebAssembly (173)to (174)WebAssembly (175)diversification (176)tool, (177)WASM-MUTATE (178)extends (179)the (180)range (181)of (182)tools (183)capable (184)of (185)generating (186)WebAssembly (187)programs, (188)a (189)topic (190)thoroughly (191)explored (192)in (193)this (194)work.

(0)Jackson (1)and (2)colleagues (3)proposed (4)the (5)pivotal (6)role (7)of (8)the (9)compiler (10)in (11)promoting (12)static (13)software (14)diversification (15)[26]. Within (16)the (17)WebAssembly (18)context, (19)CROW (20)is (21)the (22)only (23)existing (24)compiler-based (25)diversifier (26)[1]. It (27)is (28)recognized (29)as (30)a (31)superdiversifier (32)for (33)WebAssembly, (34)built (35)within (36)the (37)LLVM (38)compilation (39)toolchain (40)[27]. However, (41)the (42)direct (43)integration (44)of (45)the (46)diversifier (47)into (48)the (49)LLVM (50)compiler (51)restricts (52)its (53)applicability (54)to (55)WebAssembly (56)binaries (57)generated (58)through (59)LLVM. This (60)limitation (61)implies (62)that (63)WebAssembly (64)source (65)code (66)without (67)an (68)LLVM (69)frontend (70)implementa-tion (71)cannot (72)leverage (73)CROW’s (74)capabilities. Conversely, (75)WASM-MUTATE (76)provides (77)a (78)more (79)adaptable (80)and (81)expedited (82)WebAssembly (83)to (84)WebAssembly (85)diversification (86)solution, (87)ensuring (88)compatibility (89)with (90)any (91)compiler. Additionally, (92)unlike (93)CROW, (94)WASM-MUTATE (95)does (96)not (97)depend (98)on (99)an (100)SMT (101)solver (102)to (103)validate (104)the (105)generated (106)variants. It (107)instead (108)guarantees (109)semantic (110)equivalence (111)by (112)design, (113)leading (114)to (115)increased (116)efficiency (117)in (118)generating (119)WebAssembly (120)variants, (121)as (122)discussed (123)in (124)subsection (125)5.1. Consequently, (126)CROW (127)seems (128)to (129)provide (130)variants (131)that (132)are (133)more (134)resilient (135)to (136)further (137)compiler (138)optimizations. WASM-MUTATE (139)trades (140)off (141)the (142)preservation (143)of (144)generated (145)variants (146)to (147)create (148)more (149)variants. According (150)to (151)CROW (152)reports, (153)WASM-MUTATE (154)generates (155)more (156)variants (157)by (158)at (159)least (160)one (161)order (162)of (163)magnitude (164)in (165)the (166)same (167)amount (168)of (169)time. (170)Overall, (171)as (172)a (173)WebAssembly (174)to (175)WebAssembly (176)diversification (177)tool, (178)WASM-MUTATE (179)extends (180)the (181)range (182)of (183)tools (184)capable (185)of (186)generating (187)WebAssembly (188)programs, (189)a (190)topic (191)thoroughly (192)explored (193)in (194)this (195)work.

Suggestions

  • implementation

maintaining

replace 'maintaining' by 'keeping'

Happy suggestion

(0)As (1)far (2)as (3)we (4)know, (5)Tigress (6)is (7)the (8)only (9)cutting-edge (10)frontend (11)diversifying (12)virtualizer/obfuscator (13)that (14)supports (15)WebAssembly (16)[14]. Tigress’ (17)approach (18)transforms (19)the (20)C (21)code, (22)keeping (23)it (24)suitable (25)for (26)compilation (27)using (28)Emscripten, (29)a (30)C-to-Wasm (31)compiler, (32)resulting (33)in (34)a (35)We-bAssembly/html/Javascript (36)package. In (37)general, (38)applying (39)diversification (40)at (41)the (42)frontend (43)has (44)limitations. First, (45)it (46)would (47)require (48)a (49)unique (50)diversification (51)mechanism (52)for (53)each (54)language (55)compatible (56)with (57)the (58)frontend (59)component. Even (60)though (61)C/C++ (62)code (63)is (64)the (65)most (66)frequently (67)ported-to (68)Web-Assembly (69)language (70)[25], (71)our (72)needs (73)involve (74)modifying (75)any (76)Wasm (77)in (78)existence. Second, (79)source-based (80)diversification (81)tends (82)to (83)alter (84)the (85)code (86)section (87)of (88)the (89)final (90)WebAssembly (91)binary (92)more (93)significantly. As (94)a (95)result, (96)other (97)sections (98)of (99)the (100)WebAssembly (101)binaries (102)receive (103)less (104)attention, (105)or (106)even (107)remain (108)untouched, (109)during (110)the (111)diversification (112)process. Yet, (113)WASM-MUTATE, (114)can (115)modify (116)any (117)section (118)of (119)any (120)WebAssembly (121)binary (122)in (123)existence. Third, (124)source (125)code (126)diversification (127)could (128)unintentionally (129)introduce (130)compiler (131)fingerprints (132)into (133)the (134)compiled (135)WebAssembly (136)[8].

(0)As (1)far (2)as (3)we (4)know, (5)Tigress (6)is (7)the (8)only (9)cutting-edge (10)frontend (11)diversifying (12)virtualizer/obfuscator (13)that (14)supports (15)WebAssembly (16)[14]. Tigress’s (17)approach (18)transforms (19)the (20)C (21)code, (22)maintaining (23)it (24)suitable (25)for (26)compilation (27)using (28)Emscripten, (29)a (30)C-to-Wasm (31)compiler, (32)resulting (33)in (34)a (35)We-bAssembly/html/Javascript (36)package. In (37)general, (38)applying (39)diversification (40)at (41)the (42)frontend (43)has (44)limitations. First, (45)it (46)would (47)require (48)a (49)unique (50)diversification (51)mechanism (52)for (53)each (54)language (55)compatible (56)with (57)the (58)frontend (59)component. Even (60)though (61)C/C++ (62)code (63)is (64)the (65)most (66)frequently (67)ported-to (68)Web-Assembly (69)language (70)[25], (71)our (72)needs (73)involve (74)modifying (75)any (76)Wasm (77)in (78)existence. Second, (79)source-based (80)diversification (81)tends (82)to (83)alter (84)the (85)code (86)section (87)of (88)the (89)final (90)WebAssembly (91)binary (92)more (93)significantly. As (94)a (95)result, (96)other (97)sections (98)of (99)the (100)WebAssembly (101)binaries (102)receive (103)less (104)attention, (105)or (106)even (107)remain (108)untouched, (109)during (110)the (111)diversification (112)process. Yet, (113)WASM-MUTATE, (114)can (115)modify (116)any (117)section (118)of (119)any (120)WebAssembly (121)binary (122)in (123)existence. Third, (124)source (125)code (126)diversification (127)could (128)unintentionally (129)introduce (130)compiler (131)fingerprints (132)into (133)the (134)compiled (135)WebAssembly (136)[8].

Suggestions

  • keeping

Tigress’s

replace 'Tigress’s' by 'Tigress’'

Happy suggestion

(0)As (1)far (2)as (3)we (4)know, (5)Tigress (6)is (7)the (8)only (9)cutting-edge (10)frontend (11)diversifying (12)virtualizer/obfuscator (13)that (14)supports (15)WebAssembly (16)[14]. Tigress’ (17)approach (18)transforms (19)the (20)C (21)code, (22)keeping (23)it (24)suitable (25)for (26)compilation (27)using (28)Emscripten, (29)a (30)C-to-Wasm (31)compiler, (32)resulting (33)in (34)a (35)We-bAssembly/html/Javascript (36)package. In (37)general, (38)applying (39)diversification (40)at (41)the (42)frontend (43)has (44)limitations. First, (45)it (46)would (47)require (48)a (49)unique (50)diversification (51)mechanism (52)for (53)each (54)language (55)compatible (56)with (57)the (58)frontend (59)component. Even (60)though (61)C/C++ (62)code (63)is (64)the (65)most (66)frequently (67)ported-to (68)Web-Assembly (69)language (70)[25], (71)our (72)needs (73)involve (74)modifying (75)any (76)Wasm (77)in (78)existence. Second, (79)source-based (80)diversification (81)tends (82)to (83)alter (84)the (85)code (86)section (87)of (88)the (89)final (90)WebAssembly (91)binary (92)more (93)significantly. As (94)a (95)result, (96)other (97)sections (98)of (99)the (100)WebAssembly (101)binaries (102)receive (103)less (104)attention, (105)or (106)even (107)remain (108)untouched, (109)during (110)the (111)diversification (112)process. Yet, (113)WASM-MUTATE, (114)can (115)modify (116)any (117)section (118)of (119)any (120)WebAssembly (121)binary (122)in (123)existence. Third, (124)source (125)code (126)diversification (127)could (128)unintentionally (129)introduce (130)compiler (131)fingerprints (132)into (133)the (134)compiled (135)WebAssembly (136)[8].

(0)As (1)far (2)as (3)we (4)know, (5)Tigress (6)is (7)the (8)only (9)cutting-edge (10)frontend (11)diversifying (12)virtualizer/obfuscator (13)that (14)supports (15)WebAssembly (16)[14]. Tigress’s (17)approach (18)transforms (19)the (20)C (21)code, (22)maintaining (23)it (24)suitable (25)for (26)compilation (27)using (28)Emscripten, (29)a (30)C-to-Wasm (31)compiler, (32)resulting (33)in (34)a (35)We-bAssembly/html/Javascript (36)package. In (37)general, (38)applying (39)diversification (40)at (41)the (42)frontend (43)has (44)limitations. First, (45)it (46)would (47)require (48)a (49)unique (50)diversification (51)mechanism (52)for (53)each (54)language (55)compatible (56)with (57)the (58)frontend (59)component. Even (60)though (61)C/C++ (62)code (63)is (64)the (65)most (66)frequently (67)ported-to (68)Web-Assembly (69)language (70)[25], (71)our (72)needs (73)involve (74)modifying (75)any (76)Wasm (77)in (78)existence. Second, (79)source-based (80)diversification (81)tends (82)to (83)alter (84)the (85)code (86)section (87)of (88)the (89)final (90)WebAssembly (91)binary (92)more (93)significantly. As (94)a (95)result, (96)other (97)sections (98)of (99)the (100)WebAssembly (101)binaries (102)receive (103)less (104)attention, (105)or (106)even (107)remain (108)untouched, (109)during (110)the (111)diversification (112)process. Yet, (113)WASM-MUTATE, (114)can (115)modify (116)any (117)section (118)of (119)any (120)WebAssembly (121)binary (122)in (123)existence. Third, (124)source (125)code (126)diversification (127)could (128)unintentionally (129)introduce (130)compiler (131)fingerprints (132)into (133)the (134)compiled (135)WebAssembly (136)[8].

Suggestions

  • Tigress’

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)22 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)22 (5)of (6)25

Suggestions

  • 25.

insert '' by 'a'

Happy suggestion

(0)In (1)future (2)work, (3)we (4)aim (5)to (6)fine-tune (7)the (8)diversification (9)process, (10)balancing (11)broad (12)diversification (13)with (14)the (15)needs (16)of (17)specific (18)scenarios. Besides, (19)the (20)creation (21)of (22)rewriting (23)rules (24)for (25)WASM-MUTATE (26)is (27)currently (28)a (29)manual (30)task, (31)yet (32)we (33)have (34)identified (35)potential (36)for (37)automation. For (38)instance, (39)WASM-MUTATE (40)could (41)be (42)enhanced (43)through (44)data-driven (45)methods (46)such (47)as (48)rule (49)mining. Furthermore, (50)we (51)have (52)observed (53)that (54)the (55)impact (56)of (57)WASM-MUTATE (58)on (59)ret2spec (60)and (61)pht (62)attacks (63)is (64)considerably (65)less (66)compared (67)to (68)btb (69)attacks. These (70)attacks (71)exploit (72)the (73)returning (74)address (75)of (76)executed (77)functions (78)in (79)the (80)program (81)stack. One (82)mitigation (83)of (84)this (85)would (86)be (87)a (88)multivariant (89)execution (90)strategy, (91)implemented (92)on (93)top (94)of (95)WASM-MUTATE. By (96)offering (97)different (98)execution (99)paths, (100)the (101)returning (102)addresses (103)on (104)the (105)stack (106)at (107)each (108)function (109)execution (110)would (111)vary, (112)thereby (113)improving (114)the (115)hardening (116)of (117)binaries (118)against (119)ret2spec (120)attacks.

(0)In (1)future (2)work, (3)we (4)aim (5)to (6)fine-tune (7)the (8)diversification (9)process, (10)balancing (11)broad (12)diversification (13)with (14)the (15)needs (16)of (17)specific (18)scenarios. Besides, (19)the (20)creation (21)of (22)rewriting (23)rules (24)for (25)WASM-MUTATE (26)is (27)currently (28)a (29)manual (30)task, (31)yet (32)we (33)have (34)identified (35)potential (36)for (37)automation. For (38)instance, (39)WASM-MUTATE (40)could (41)be (42)enhanced (43)through (44)data-driven (45)methods (46)such (47)as (48)rule (49)mining. Furthermore, (50)we (51)have (52)observed (53)that (54)the (55)impact (56)of (57)WASM-MUTATE (58)on (59)ret2spec (60)and (61)pht (62)attacks (63)is (64)considerably (65)less (66)compared (67)to (68)btb (69)attacks. These (70)attacks (71)exploit (72)the (73)returning (74)address (75)of (76)executed (77)functions (78)in (79)the (80)program (81)stack. One (82)mitigation (83)of (84)this (85)would (86)be (87)multivariant (88)execution (89)strategy, (90)implemented (91)on (92)top (93)of (94)WASM-MUTATE. By (95)offering (96)different (97)execution (98)paths, (99)the (100)returning (101)addresses (102)on (103)the (104)stack (105)at (106)each (107)function (108)execution (109)would (110)vary, (111)thereby (112)improving (113)the (114)hardening (115)of (116)binaries (117)against (118)ret2spec (119)attacks.

Suggestions

  • a

ret2spec

Possible typo detected.

Happy suggestion

In future work, we aim to fine-tune the diversification process, balancing broad diversification with the needs of specific scenarios. Besides, the creation of rewriting rules for WASM-MUTATE is currently a manual task, yet we have identified potential for automation. For instance, WASM-MUTATE could be enhanced through data-driven methods such as rule mining. Furthermore, we have observed that the impact of WASM-MUTATE on ret2spec and pht attacks is considerably less compared to btb attacks. These attacks exploit the returning address of executed functions in the program stack. One mitigation of this would be multivariant execution strategy, implemented on top of WASM-MUTATE. By offering different execution paths, the returning addresses on the stack at each function execution would vary, thereby improving the hardening of binaries against ret2spec attacks.

Suggestions

  • respect
  • retype
  • retyped
  • retypes

ret2spec

Possible typo detected.

Happy suggestion

WASM-MUTATE is a fast and effective diversification tool for WebAssembly, with a 100% diversification rate across the 303 programs of the considered benchmark. Concerning speed, it creates over 9000 unique variants per hour. The WASM-MUTATE workflow ensures that all final variants offer different and unique execution traces. Remarkably, WASM-MUTATE creates variants that have a minimal impact on execution time. We have proven that WASM-MUTATE can mitigate Spectre attacks in WebAssembly, producing fully protected variants of two versions of the btb attack, and variants of ret2spec and pht that leak less data than the original ones.

Suggestions

  • respect
  • retype
  • retyped
  • retypes

insert '' by 'Conclusion:'

Happy suggestion

(0)8. Conclusion: (1)Conclusion: (2)Conclusion: (3)Conclusion: (4)Conclusion: (5)Conclusion: (6)Conclusion: (7)Conclusion: (8)Conclusion: (9)Conclusion: (10)Conclusion: (11)Conclusion: (12)Conclusion: (13)Conclusion: (14)Conclusion: (15)Conclusion: (16)Conclusion: (17)Conclusion: (18)Conclusion: (19)Conclusion: (20)Conclusion: (21)Conclusion: (22)Conclusion: (23)Conclusion: (24)Conclusion: (25)Conclusion: (26)Conclusion: (27)Conclusion: (28)Conclusion: (29)Conclusion: (30)Conclusion: (31)Conclusion: (32)Conclusion: (33)Conclusion: (34)Conclusion: (35)Conclusion: (36)Conclusion: (37)Conclusion: (38)Conclusion: (39)Conclusion: (40)Conclusion: (41)Conclusion: (42)Conclusion: (43)Conclusion: (44)Conclusion: (45)Conclusion: (46)Conclusion: (47)Conclusion: (48)Conclusion: (49)Conclusion: (50)Conclusion: (51)Conclusion: (52)Conclusion: (53)Conclusion: (54)Conclusion: (55)Conclusion: (56)Conclusion

(0)8. Conclusion

Suggestions

  • Conclusion:

with

replace 'with' by 'to'

Happy suggestion

(0)BREWasm (1)[10] (2)offers (3)a (4)comprehensive (5)static (6)binary (7)rewriting (8)framework (9)for (10)WebAssembly (11)and (12)can (13)be (14)considered (15)to (16)be (17)the (18)most (19)similar (20)to (21)WASM-MUTATE. For (22)instance, (23)it (24)can (25)be (26)used (27)to (28)model (29)a (30)diversification (31)engine. It (32)parses (33)a (34)WebAssembly (35)binary (36)into (37)objects, (38)rewrites (39)them (40)using (41)fine-grained (42)APIs, (43)integrates (44)these (45)APIs (46)to (47)provide (48)high-level (49)ones, (50)and (51)re-encodes (52)the (53)updated (54)objects (55)back (56)into (57)a (58)valid (59)WebAssembly (60)binary. The (61)effectiveness (62)and (63)efficiency (64)of (65)BREWasm (66)have (67)been (68)demonstrated (69)through (70)various (71)WebAssembly (72)applications (73)and (74)case (75)studies (76)on (77)code (78)obfuscation, (79)software (80)testing, (81)program (82)repair, (83)and (84)software (85)optimization. The (86)implementation (87)of (88)BREWasm (89)follows (90)a (91)completely (92)different (93)technical (94)approach. In (95)comparison (96)to (97)our (98)work, (99)the (100)authors (101)pointed (102)out (103)that (104)our (105)tool (106)employs (107)lazy (108)parsing (109)of (110)WebAssembly. Although (111)they (112)perceived (113)this (114)as (115)a (116)limitation, (117)it (118)is (119)eagerly (120)implemented (121)to (122)accelerate (123)the (124)generation (125)of (126)WebAssembly (127)binaries. Additionally, (128)our (129)tool (130)leverages (131)the (132)parser (133)and (134)encoder (135)of (136)wasmtime, (137)a (138)standalone (139)compiler (140)and (141)interpreter (142)for (143)WebAssembly, (144)thereby (145)boosting (146)its (147)reliability (148)and (149)lowering (150)its (151)error-prone (152)nature.

(0)BREWasm (1)[10] (2)offers (3)a (4)comprehensive (5)static (6)binary (7)rewriting (8)framework (9)for (10)WebAssembly (11)and (12)can (13)be (14)con-sidered (15)to (16)be (17)the (18)most (19)similar (20)to (21)WASM-MUTATE. For (22)instance, (23)it (24)can (25)be (26)used (27)to (28)model (29)a (30)diversification (31)engine. (32)It (33)parses (34)a (35)WebAssembly (36)binary (37)into (38)objects, (39)rewrites (40)them (41)using (42)fine-grained (43)APIs, (44)integrates (45)these (46)APIs (47)to (48)provide (49)high-level (50)ones, (51)and (52)re-encodes (53)the (54)updated (55)objects (56)back (57)into (58)a (59)valid (60)WebAssembly (61)binary. The (62)effectiveness (63)and (64)efficiency (65)of (66)BREWasm (67)have (68)been (69)demonstrated (70)through (71)various (72)WebAssembly (73)applications (74)and (75)case (76)studies (77)on (78)code (79)obfuscation, (80)software (81)testing, (82)program (83)repair, (84)and (85)software (86)optimization. The (87)implementation (88)of (89)BREWasm (90)follows (91)a (92)completely (93)different (94)technical (95)approach. In (96)comparison (97)with (98)our (99)work, (100)the (101)authors (102)pointed (103)out (104)that (105)our (106)tool (107)employs (108)lazy (109)parsing (110)of (111)WebAssembly. Although (112)they (113)perceived (114)this (115)as (116)a (117)limitation, (118)it (119)is (120)eagerly (121)implemented (122)to (123)accelerate (124)the (125)generation (126)of (127)WebAssembly (128)binaries. Additionally, (129)our (130)tool (131)leverages (132)the (133)parser (134)and (135)encoder (136)of (137)wasmtime, (138)a (139)standalone (140)compiler (141)and (142)interpreter (143)for (144)WebAssembly, (145)thereby (146)boosting (147)its (148)reliability (149)and (150)lowering (151)its (152)error-prone (153)nature.

Suggestions

  • to

con-sidered

replace 'con-sidered' by 'considered'

Happy suggestion

(0)BREWasm (1)[10] (2)offers (3)a (4)comprehensive (5)static (6)binary (7)rewriting (8)framework (9)for (10)WebAssembly (11)and (12)can (13)be (14)considered (15)to (16)be (17)the (18)most (19)similar (20)to (21)WASM-MUTATE. For (22)instance, (23)it (24)can (25)be (26)used (27)to (28)model (29)a (30)diversification (31)engine. It (32)parses (33)a (34)WebAssembly (35)binary (36)into (37)objects, (38)rewrites (39)them (40)using (41)fine-grained (42)APIs, (43)integrates (44)these (45)APIs (46)to (47)provide (48)high-level (49)ones, (50)and (51)re-encodes (52)the (53)updated (54)objects (55)back (56)into (57)a (58)valid (59)WebAssembly (60)binary. The (61)effectiveness (62)and (63)efficiency (64)of (65)BREWasm (66)have (67)been (68)demonstrated (69)through (70)various (71)WebAssembly (72)applications (73)and (74)case (75)studies (76)on (77)code (78)obfuscation, (79)software (80)testing, (81)program (82)repair, (83)and (84)software (85)optimization. The (86)implementation (87)of (88)BREWasm (89)follows (90)a (91)completely (92)different (93)technical (94)approach. In (95)comparison (96)to (97)our (98)work, (99)the (100)authors (101)pointed (102)out (103)that (104)our (105)tool (106)employs (107)lazy (108)parsing (109)of (110)WebAssembly. Although (111)they (112)perceived (113)this (114)as (115)a (116)limitation, (117)it (118)is (119)eagerly (120)implemented (121)to (122)accelerate (123)the (124)generation (125)of (126)WebAssembly (127)binaries. Additionally, (128)our (129)tool (130)leverages (131)the (132)parser (133)and (134)encoder (135)of (136)wasmtime, (137)a (138)standalone (139)compiler (140)and (141)interpreter (142)for (143)WebAssembly, (144)thereby (145)boosting (146)its (147)reliability (148)and (149)lowering (150)its (151)error-prone (152)nature.

(0)BREWasm (1)[10] (2)offers (3)a (4)comprehensive (5)static (6)binary (7)rewriting (8)framework (9)for (10)WebAssembly (11)and (12)can (13)be (14)con-sidered (15)to (16)be (17)the (18)most (19)similar (20)to (21)WASM-MUTATE. For (22)instance, (23)it (24)can (25)be (26)used (27)to (28)model (29)a (30)diversification (31)engine. (32)It (33)parses (34)a (35)WebAssembly (36)binary (37)into (38)objects, (39)rewrites (40)them (41)using (42)fine-grained (43)APIs, (44)integrates (45)these (46)APIs (47)to (48)provide (49)high-level (50)ones, (51)and (52)re-encodes (53)the (54)updated (55)objects (56)back (57)into (58)a (59)valid (60)WebAssembly (61)binary. The (62)effectiveness (63)and (64)efficiency (65)of (66)BREWasm (67)have (68)been (69)demonstrated (70)through (71)various (72)WebAssembly (73)applications (74)and (75)case (76)studies (77)on (78)code (79)obfuscation, (80)software (81)testing, (82)program (83)repair, (84)and (85)software (86)optimization. The (87)implementation (88)of (89)BREWasm (90)follows (91)a (92)completely (93)different (94)technical (95)approach. In (96)comparison (97)with (98)our (99)work, (100)the (101)authors (102)pointed (103)out (104)that (105)our (106)tool (107)employs (108)lazy (109)parsing (110)of (111)WebAssembly. Although (112)they (113)perceived (114)this (115)as (116)a (117)limitation, (118)it (119)is (120)eagerly (121)implemented (122)to (123)accelerate (124)the (125)generation (126)of (127)WebAssembly (128)binaries. Additionally, (129)our (130)tool (131)leverages (132)the (133)parser (134)and (135)encoder (136)of (137)wasmtime, (138)a (139)standalone (140)compiler (141)and (142)interpreter (143)for (144)WebAssembly, (145)thereby (146)boosting (147)its (148)reliability (149)and (150)lowering (151)its (152)error-prone (153)nature.

Suggestions

  • considered

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)23 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)23 (5)of (6)25

Suggestions

  • 25.

https://doi.

delete 'https://doi.' by ''

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

URL:

delete 'URL:' by ''

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

243-255.

delete '243-255.' by ''

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

p.

delete 'p.' by ''

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

USA.

delete 'USA.' by ''

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

NY,

delete 'NY,' by ''

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

York,

delete 'York,' by ''

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

New

replace 'New' by 'https://doi.org.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • https://doi.org.

Machinery,

replace 'Machinery,' by 'URL:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • URL:

Computing

replace 'Computing' by '243-255.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 243-255.

for

replace 'for' by 'p.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • p.

Association

replace 'Association' by 'USA.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • USA.

Security,

replace 'Security,' by 'NY,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • NY,

Communications

replace 'Communications' by 'York,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • York,

and

replace 'and' by 'New'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • New

Computer

replace 'Computer' by 'Machinery,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Machinery,

on

replace 'on' by 'Computing'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Computing

Conference

replace 'Conference' by 'for'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • for

SIGSAC

replace 'SIGSAC' by 'Association'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Association

ACM

replace 'ACM' by 'Security,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Security,

22nd

replace '22nd' by 'Communications'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Communications

the

replace 'the' by 'and'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • and

of

replace 'of' by 'Computer'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Computer

Proceedings

replace 'Proceedings' by 'on'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • on

in:

replace 'in:' by 'Conference'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Conference

attacks,

replace 'attacks,' by 'SIGSAC'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • SIGSAC

function-reuse

replace 'function-reuse' by 'ACM'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • ACM

against

replace 'against' by '22nd'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 22nd

protection

replace 'protection' by 'the'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • the

and

replace 'and' by 'of'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • of

randomization

replace 'randomization' by 'Proceedings'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Proceedings

Table

replace 'Table' by 'in:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • in:

trap:

replace 'trap:' by 'attacks,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • attacks,

a

replace 'a' by 'function-reuse'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • function-reuse

It’s

replace 'It’s' by 'against'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • against

2015.

replace '2015.' by 'protection'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • protection

M.,

replace 'M.,' by 'and'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • and

Franz,

replace 'Franz,' by 'randomization'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • randomization

B.,

replace 'B.,' by 'Table'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Table

Sutter,

replace 'Sutter,' by 'trap:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • trap:

De

replace 'De' by 'a'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • a

T.,

replace 'T.,' by 'It’s'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • It’s

Holz,

replace 'Holz,' by '2015.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2015.

A.R.,

replace 'A.R.,' by 'M.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • M.,

Sadeghi,

replace 'Sadeghi,' by 'Franz,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Franz,

L.,

replace 'L.,' by 'B.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • B.,

Davi,

replace 'Davi,' by 'Sutter,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Sutter,

P.,

replace 'P.,' by 'De'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • De

Larsen,

replace 'Larsen,' by 'T.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • T.,

C.,

replace 'C.,' by 'Holz,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Holz,

Liebchen,

replace 'Liebchen,' by 'A.R.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • A.R.,

F.,

replace 'F.,' by 'Sadeghi,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Sadeghi,

Schuster,

replace 'Schuster,' by 'L.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • L.,

S.,

replace 'S.,' by 'Davi,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Davi,

Volckaert,

replace 'Volckaert,' by 'P.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • P.,

S.J.,

replace 'S.J.,' by 'Larsen,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Larsen,

Crane,

replace 'Crane,' by 'C.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • C.,

Zealand.

replace 'Zealand.' by 'Liebchen,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Liebchen,

New

replace 'New' by 'F.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • F.,

Auckland,

replace 'Auckland,' by 'Schuster,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Schuster,

of

replace 'of' by 'S.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • S.,

University

replace 'University' by 'Volckaert,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Volckaert,

The

replace 'The' by 'S.J.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • S.J.,

Science,

replace 'Science,' by 'Crane,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Crane,

Computer

replace 'Computer' by 'Zealand.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Zealand.

of

replace 'of' by 'New'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • New

Department

replace 'Department' by 'Auckland,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Auckland,

Report.

replace 'Report.' by 'of'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • of

Technical

replace 'Technical' by 'University'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • University

transformations.

replace 'transformations.' by 'Science,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Science,

obfuscating

replace 'obfuscating' by 'Computer'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Computer

taxonomy

delete 'taxonomy' by ''

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

A

delete 'A' by ''

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

1997.

replace '1997.' by 'Department'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Department

D.,

replace 'D.,' by 'Report.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Report.

Low,

replace 'Low,' by 'Technical'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Technical

C.,

replace 'C.,' by 'transformations.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • transformations.

Thomborson,

replace 'Thomborson,' by 'obfuscating'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • obfuscating

C.,

replace 'C.,' by 'of'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • of

Collberg,

replace 'Collberg,' by 'taxonomy'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • taxonomy

565-584.

replace '565-584.' by 'A'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • A

12,

replace '12,' by '1997.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 1997.

Security

replace 'Security' by 'D.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • D.,

&

replace '&' by 'Low,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Low,

Computers

replace 'Computers' by 'C.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • C.,

evolution.

replace 'evolution.' by 'Thomborson,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Thomborson,

program

replace 'program' by 'C.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • C.,

through

replace 'through' by 'Collberg,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Collberg,

protection

replace 'protection' by '565-584.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 565-584.

system

replace 'system' by '12,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 12,

Operating

replace 'Operating' by 'Security'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Security

1993.

replace '1993.' by '&'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • &

F.B.,

replace 'F.B.,' by 'Computers'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Computers

Cohen,

replace 'Cohen,' by 'evolution.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • evolution.

2086702.

replace '2086702.' by 'program'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • program

doi:10.1145/2086696.

replace 'doi:10.1145/2086696.' by 'through'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • through

2086702,

replace '2086702,' by 'protection'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • protection

https://doi.org/10.1145/2086696.

replace 'https://doi.org/10.1145/2086696.' by 'system'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • system

URL:

replace 'URL:' by 'Operating'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Operating

8.

replace '8.' by '1993.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 1993.

Optim.

replace 'Optim.' by 'F.B.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • F.B.,

Code

replace 'Code' by 'Cohen,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Cohen,

Archit.

replace 'Archit.' by '2086702.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2086702.

Trans.

replace 'Trans.' by 'doi:10.1145/2086696.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • doi:10.1145/2086696.

ACM

replace 'ACM' by '2086702,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2086702,

processors.

replace 'processors.' by 'https://doi.org/10.1145/2086696.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • https://doi.org/10.1145/2086696.

x86

replace 'x86' by 'URL:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • URL:

modern

replace 'modern' by '8.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 8.

on

replace 'on' by 'Optim.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Optim.

attacks

replace 'attacks' by 'Code'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Code

time

replace 'time' by 'Archit.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Archit.

for

replace 'for' by 'Trans.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Trans.

mitigations

replace 'mitigations' by 'ACM'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • ACM

Compiler

replace 'Compiler' by 'processors.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • processors.

2012.

replace '2012.' by 'x86'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • x86

B.,

replace 'B.,' by 'modern'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • modern

Sutter,

replace 'Sutter,' by 'on'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • on

De

replace 'De' by 'attacks'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • attacks

B.,

replace 'B.,' by 'time'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • time

Coppens,

replace 'Coppens,' by 'for'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • for

J.V.,

replace 'J.V.,' by 'mitigations'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • mitigations

Cleemput,

replace 'Cleemput,' by 'Compiler'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Compiler

2308.03123.

replace '2308.03123.' by '2012.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2012.

arXiv:

replace 'arXiv:' by 'B.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • B.,

03123,

replace '03123,' by 'Sutter,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Sutter,

2308.

replace '2308.' by 'De'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • De

48550/arXiv.

replace '48550/arXiv.' by 'B.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • B.,

arXiv:2308.03123doi:10.

replace 'arXiv:2308.03123doi:10.' by 'Coppens,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Coppens,

,

replace ',' by 'J.V.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • J.V.,

e-prints

replace 'e-prints' by 'Cleemput,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Cleemput,

arXiv

replace 'arXiv' by '2308.03123.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2308.03123.

WebAssembly.

replace 'WebAssembly.' by 'arXiv:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • arXiv:

for

replace 'for' by '03123,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 03123,

Obfus-cation

replace 'Obfus-cation' by '2308.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2308.

Binary

replace 'Binary' by '48550/arXiv.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 48550/arXiv.

WASMixer:

replace 'WASMixer:' by 'arXiv:2308.03123doi:10.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • arXiv:2308.03123doi:10.

2023.

replace '2023.' by ','

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • ,

H.,

replace 'H.,' by 'e-prints'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • e-prints

Wang,

replace 'Wang,' by 'ArXiv'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • ArXiv

Y.,

replace 'Y.,' by 'WebAssembly.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • WebAssembly.

Guo,

replace 'Guo,' by 'for'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • for

N.,

replace 'N.,' by 'Obfus-cation'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Obfus-cation

He,

replace 'He,' by 'Binary'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Binary

S.,

replace 'S.,' by '2023.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2023.

Cao,

replace 'Cao,' by 'H.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • H.,

139-163.

replace '139-163.' by 'Wang,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Wang,

pp.

replace 'pp.' by 'Y.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Y.,

Cham.

replace 'Cham.' by 'Guo,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Guo,

Switzerland,

replace 'Switzerland,' by 'N.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • N.,

Nature

replace 'Nature' by 'He,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • He,

Springer

replace 'Springer' by 'S.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • S.,

Analysis,

replace 'Analysis,' by 'Cao,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Cao,

Static

replace 'Static' by '139-163.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 139-163.

(Eds.),

replace '(Eds.),' by 'pp.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • pp.

J.F.

replace 'J.F.' by 'Cham.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Cham.

Morales,

replace 'Morales,' by 'Switzerland,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Switzerland,

M.V.,

replace 'M.V.,' by 'Nature'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Nature

Hermenegildo,

replace 'Hermenegildo,' by 'Springer'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Springer

in:

replace 'in:' by 'Analysis,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Analysis,

webassembly,

replace 'webassembly,' by 'Static'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Static

for

replace 'for' by '(Eds.),'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • (Eds.),

framework

replace 'framework' by 'J.F.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • J.F.

rewriting

replace 'rewriting' by 'Morales,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Morales,

binary

replace 'binary' by 'M.V.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • M.V.,

static

replace 'static' by 'Hermenegildo,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Hermenegildo,

general

replace 'general' by 'in:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • in:

A

replace 'A' by 'webassembly,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • webassembly,

Brewasm:

replace 'Brewasm:' by 'for'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • for

2023b.

replace '2023b.' by 'framework'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • framework

H.,

replace 'H.,' by 'rewriting'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • rewriting

Wang,

replace 'Wang,' by 'binary'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • binary

Y.,

replace 'Y.,' by 'static'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • static

Guo,

replace 'Guo,' by 'general'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • general

N.,

replace 'N.,' by 'A'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • A

He,

replace 'He,' by '2023b.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2023b.

S.,

replace 'S.,' by 'H.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • H.,

Cao,

replace 'Cao,' by 'Wang,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Wang,

doi:10.1145/3571207.

replace 'doi:10.1145/3571207.' by 'Y.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Y.,

org/10.1145/3571207,

replace 'org/10.1145/3571207,' by 'Guo,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Guo,

https://doi.

replace 'https://doi.' by 'N.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • N.,

URL:

replace 'URL:' by 'He,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • He,

7.

replace '7.' by 'S.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • S.,

Lang.

replace 'Lang.' by 'Cao,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Cao,

Program.

replace 'Program.' by 'doi:10.1145/3571207.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • doi:10.1145/3571207.

ACM

replace 'ACM' by 'org/10.1145/3571207,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • org/10.1145/3571207,

Proc.

replace 'Proc.' by 'https://doi.org.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • https://doi.org.

anti-unification.

replace 'anti-unification.' by 'URL:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • URL:

and

replace 'and' by '7.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 7.

e-graphs

replace 'e-graphs' by 'Lang.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Lang.

with

replace 'with' by 'Program.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Program.

abstractions

replace 'abstractions' by 'ACM'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • ACM

better

replace 'better' by 'Proc.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Proc.

Learning

replace 'Learning' by 'anti-unification.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • anti-unification.

Babble:

replace 'Babble:' by 'and'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • and

2023a.

replace '2023a.' by 'e-graphs'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • e-graphs

N.,

replace 'N.,' by 'with'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • with

Polikarpova,

replace 'Polikarpova,' by 'abstractions'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • abstractions

Z.,

replace 'Z.,' by 'better'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • better

Tatlock,

replace 'Tatlock,' by 'Learning'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Learning

M.,

replace 'M.,' by 'Babble:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Babble:

Willsey,

replace 'Willsey,' by '2023a.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2023a.

C.,

replace 'C.,' by 'N.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • N.,

Nandi,

replace 'Nandi,' by 'Polikarpova,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Polikarpova,

R.,

replace 'R.,' by 'and'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • and

Kunkel,

replace 'Kunkel,' by 'Z.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Z.,

D.,

replace 'D.,' by 'Tatlock,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Tatlock,

Cao,

replace 'Cao,' by 'M.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • M.,

2023.103296.

replace '2023.103296.' by 'Willsey,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Willsey,

doi:https://doi.org/10.1016/j.cose.

replace 'doi:https://doi.org/10.1016/j.cose.' by 'C.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • C.,

article/pii/S0167404823002067,

replace 'article/pii/S0167404823002067,' by 'Nandi,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Nandi,

sciencedirect.com/science/

replace 'sciencedirect.com/science/' by 'R.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • R.,

https://www.

replace 'https://www.' by 'Kunkel,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Kunkel,

URL:

replace 'URL:' by 'D.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • D.,

103296.

replace '103296.' by 'Cao,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Cao,

131,

replace '131,' by '2023.103296.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2023.103296.

Se-curity

replace 'Se-curity' by 'doi:https://doi.org/10.1016/j.cose.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • doi:https://doi.org/10.1016/j.cose.

&

replace '&' by 'article/pii/S0167404823002067,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • article/pii/S0167404823002067,

Computers

replace 'Computers' by 'Sciencedirect.com/science/'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Sciencedirect.com/science/

evasion.

replace 'evasion.' by 'https://www.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • https://www.

malware

replace 'malware' by 'URL:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • URL:

for

replace 'for' by '103296.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 103296.

diversification

replace 'diversification' by '131,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 131,

Webassembly

replace 'Webassembly' by 'Security'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Security

2023.

replace '2023.' by '&'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • &

B.,

replace 'B.,' by 'Computers'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Computers

Baudry,

replace 'Baudry,' by 'evasion.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • evasion.

T.,

replace 'T.,' by 'malware'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • malware

Toady,

replace 'Toady,' by 'for'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • for

M.,

replace 'M.,' by 'diversification'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • diversification

Monperrus,

replace 'Monperrus,' by 'Webassembly'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Webassembly

J.,

replace 'J.,' by '2023.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2023.

Cabrera-Arteaga,

replace 'Cabrera-Arteaga,' by 'B.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • B.,

3564007.

replace '3564007.' by 'Baudry,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Baudry,

doi:10.1145/3560828.

replace 'doi:10.1145/3560828.' by 'T.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • T.,

3564007,

replace '3564007,' by 'Toady,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Toady,

10.1145/3560828.

replace '10.1145/3560828.' by 'M.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • M.,

https://doi.org/

replace 'https://doi.org/' by 'Monperrus,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Monperrus,

URL:

replace 'URL:' by 'J.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • J.,

11-22.

replace '11-22.' by 'Cabrera-Arteaga,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Cabrera-Arteaga,

p.

replace 'p.' by '3564007.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 3564007.

USA.

replace 'USA.' by 'doi:10.1145/3560828.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • doi:10.1145/3560828.

NY,

replace 'NY,' by '3564007,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 3564007,

York,

replace 'York,' by 'https://doi.org/10.1145/3560828.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • https://doi.org/10.1145/3560828.

New

replace 'New' by 'URL:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • URL:

Machinery,

replace 'Machinery,' by '11-22.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 11-22.

Computing

replace 'Computing' by 'p.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • p.

for

replace 'for' by 'USA.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • USA.

Association

replace 'Association' by 'NY,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • NY,

Defense,

replace 'Defense,' by 'York,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • York,

Target

replace 'Target' by 'New'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • New

Moving

replace 'Moving' by 'Machinery,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Machinery,

on

replace 'on' by 'Computing'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Computing

Workshop

replace 'Workshop' by 'for'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • for

ACM

replace 'ACM' by 'Association'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Association

9th

replace '9th' by 'Defense,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Defense,

the

replace 'the' by 'Target'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Target

of

replace 'of' by 'Moving'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Moving

Proceedings

replace 'Proceedings' by 'on'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • on

in:

replace 'in:' by 'Workshop'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Workshop

edge,

replace 'edge,' by 'ACM'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • ACM

the

replace 'the' by '9th'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 9th

at

replace 'at' by 'the'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • the

execution

replace 'execution' by 'of'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • of

Multi-variant

replace 'Multi-variant' by 'Proceedings'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Proceedings

2022.

replace '2022.' by 'in:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • in:

B.,

replace 'B.,' by 'edge,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • edge,

Baudry,

replace 'Baudry,' by 'the'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • the

M.,

replace 'M.,' by 'at'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • at

Monperrus,

replace 'Monperrus,' by 'execution'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • execution

P.,

replace 'P.,' by 'Multi-variant'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Multi-variant

Laperdrix,

replace 'Laperdrix,' by '2022.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2022.

J.,

replace 'J.,' by 'B.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • B.,

Arteaga,

replace 'Arteaga,' by 'Baudry,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Baudry,

Cabrera

replace 'Cabrera' by 'M.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • M.,

3397567.

replace '3397567.' by 'Monperrus,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Monperrus,

1145/3397537.

replace '1145/3397537.' by 'P.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • P.,

doi:10.

replace 'doi:10.' by 'Laperdrix,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Laperdrix,

//arxiv.org/pdf/2002.10213,

replace '//arxiv.org/pdf/2002.10213,' by 'J.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • J.,

http:

replace 'http:' by 'Arteaga,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Arteaga,

URL:

replace 'URL:' by 'Cabrera'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Cabrera

Runtimes.

replace 'Runtimes.' by '3397567.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 3397567.

Language

replace 'Language' by '1145/3397537.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 1145/3397537.

Modern

replace 'Modern' by 'doi:10.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • doi:10.

on

replace 'on' by 'http://www.arxiv.org/pdf/2002.10213,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • http://www.arxiv.org/pdf/2002.10213,

Workshop

replace 'Workshop' by 'URL:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • URL:

MoreVMs:

replace 'MoreVMs:' by 'Runtimes.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Runtimes.

of

replace 'of' by 'Language'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Language

Proceedings

replace 'Proceedings' by 'Modern'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Modern

in:

replace 'in:' by 'on'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • on

bytecode,

replace 'bytecode,' by 'Workshop'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Workshop

webassembly

replace 'webassembly' by 'MoreVMs:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • MoreVMs:

insert '' by 'Proceedings'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Proceedings

Superoptimization

replace 'Superoptimization' by 'in:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • in:

2020.

replace '2020.' by 'bytecode,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • bytecode,

M.,

replace 'M.,' by 'webassembly'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • webassembly

Monperrus,

replace 'Monperrus,' by 'of'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • of

B.,

replace 'B.,' by 'Superoptimization'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Superoptimization

Baudry,

replace 'Baudry,' by '2020.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2020.

L.,

replace 'L.,' by 'M.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • M.,

Satabin,

replace 'Satabin,' by 'Monperrus,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Monperrus,

O.,

replace 'O.,' by 'B.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • B.,

Floros,

replace 'Floros,' by 'Baudry,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Baudry,

J.,

replace 'J.,' by 'L.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • L.,

Gu,

replace 'Gu,' by 'Satabin,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Satabin,

S.,

replace 'S.,' by 'O.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • O.,

Donde,

replace 'Donde,' by 'Floros,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Floros,

Cabrera-Arteaga,

delete 'Cabrera-Arteaga,' by ''

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

358924.

replace '358924.' by 'Gu,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Gu,

2007.

replace '2007.' by 'S.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • S.,

doi:10.1109/PCCC.

replace 'doi:10.1109/PCCC.' by 'Donde,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Donde,

434-441.

replace '434-441.' by 'J.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • J.,

pp.

replace 'pp.' by 'Cabrera-Arteaga,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Cabrera-Arteaga,

Conference,

replace 'Conference,' by '358924.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 358924.

Communications

replace 'Communications' by '2007.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2007.

and

replace 'and' by 'doi:10.1109/PCCC.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • doi:10.1109/PCCC.

Computing,

replace 'Computing,' by '434-441.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 434-441.

Performance,

replace 'Performance,' by 'pp.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • pp.

Inter-national

replace 'Inter-national' by 'Conference,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Conference,

IEEE

replace 'IEEE' by 'Communications'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Communications

2007

replace '2007' by 'and'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • and

in:

replace 'in:' by 'Computing,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Computing,

exploits,

replace 'exploits,' by 'Performance,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Performance,

error

replace 'error' by 'Inter-national'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Inter-national

memory

replace 'memory' by 'IEEE'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • IEEE

defeating

replace 'defeating' by '2007'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2007

for

replace 'for' by 'in:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • in:

replice

replace 'replice' by 'exploits,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • exploits,

process

replace 'process' by 'error'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • error

Diversified

replace 'Diversified' by 'memory'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • memory

2007.

replace '2007.' by 'defeating'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • defeating

A.,

replace 'A.,' by 'for'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • for

Lanzi,

replace 'Lanzi,' by 'replice'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • replice

L.,

replace 'L.,' by 'process'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • process

Cavallaro,

replace 'Cavallaro,' by 'Diversified'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Diversified

D.,

replace 'D.,' by '2007.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2007.

Bruschi,

replace 'Bruschi,' by 'A.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • A.,

1016/j.cose.2022.102745.

replace '1016/j.cose.2022.102745.' by 'Lanzi,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Lanzi,

doi:https://doi.org/10.

replace 'doi:https://doi.org/10.' by 'L.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • L.,

com/science/article/pii/S167404822001407,

replace 'com/science/article/pii/S167404822001407,' by 'Cavallaro,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Cavallaro,

https://www.sciencedirect.

replace 'https://www.sciencedirect.' by 'D.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • D.,

URL:

replace 'URL:' by 'Bruschi,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Bruschi,

102745.

replace '102745.' by '1016/j.cose.2022.102745.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 1016/j.cose.2022.102745.

118,

replace '118,' by 'doi:https://doi.org/10.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • doi:https://doi.org/10.

Security

replace 'Security' by 'com/science/article/pii/S167404822001407,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • com/science/article/pii/S167404822001407,

&

replace '&' by 'https://www.sciencedirect.com.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • https://www.sciencedirect.com.

Com-puters

replace 'Com-puters' by 'URL:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • URL:

webassembly.

replace 'webassembly.' by '102745.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 102745.

for

replace 'for' by '118,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 118,

scanner

replace 'scanner' by 'Security'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Security

vulnerability

replace 'vulnerability' by '&'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • &

static

replace 'static' by 'Com-puters'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Com-puters

efficient

replace 'efficient' by 'assembly.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • assembly.

An

replace 'An' by 'web'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • web

Wasmati:

replace 'Wasmati:' by 'for'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • for

2022.

replace '2022.' by 'scanner'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • scanner

J.F.,

replace 'J.F.,' by 'vulnerability'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • vulnerability

Santos,

replace 'Santos,' by 'static'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • static

N.,

replace 'N.,' by 'efficient'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • efficient

Santos,

replace 'Santos,' by 'An'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • An

P.,

replace 'P.,' by 'Wasmati:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Wasmati:

Lopes,

replace 'Lopes,' by '2022.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2022.

T.,

replace 'T.,' by 'J.F.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • J.F.,

Brito,

replace 'Brito,' by 'Santos,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Santos,

00085.

replace '00085.' by 'N.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • N.,

2023.

replace '2023.' by 'Santos,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Santos,

doi:10.1109/SANER56733.

replace 'doi:10.1109/SANER56733.' by 'P.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • P.,

753-757.

replace '753-757.' by 'Lopes,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Lopes,

pp.

replace 'pp.' by 'T.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • T.,

(SANER),

replace '(SANER),' by 'Brito,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Brito,

Reengineering

replace 'Reengineering' by '00085.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 00085.

and

replace 'and' by '2023.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2023.

Evolution

replace 'Evolution' by 'doi:10.1109/SANER56733.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • doi:10.1109/SANER56733.

Analysis,

replace 'Analysis,' by '753-757.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 753-757.

Software

replace 'Software' by 'pp.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • pp.

on

replace 'on' by '(SANER),'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • (SANER),

Conference

replace 'Conference' by 'Reengineering'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Reengineering

International

replace 'International' by 'and'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • and

IEEE

replace 'IEEE' by 'Evolution'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Evolution

2023

replace '2023' by 'Analysis,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Analysis,

in:

replace 'in:' by 'Software'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Software

everyone,

replace 'everyone,' by 'on'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • on

for

replace 'for' by 'Conference'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Conference

framework

replace 'framework' by 'International'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • International

analysis

replace 'analysis' by 'IEEE'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • IEEE

webassembly

replace 'webassembly' by '2023'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2023

static

replace 'static' by 'in:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • in:

A

replace 'A' by 'everyone,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • everyone,

Wasma:

replace 'Wasma:' by 'for'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • for

2023.

replace '2023.' by 'framework'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • framework

M.,

replace 'M.,' by 'analysis'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • analysis

Mezini,

replace 'Mezini,' by 'webassembly'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • webassembly

L.,

replace 'L.,' by 'static'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • static

Baumgartner,

replace 'Baumgartner,' by 'A'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • A

T.,

replace 'T.,' by 'Wasma:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Wasma:

Roth,

replace 'Roth,' by '2023.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 2023.

F.,

replace 'F.,' by 'M.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • M.,

Breitfelder,

replace 'Breitfelder,' by 'Mezini,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Mezini,

usenix.org/conference/usenixsecurity19/presentation/azad.

replace 'usenix.org/conference/usenixsecurity19/presentation/azad.' by 'L.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • L.,

https://www.

replace 'https://www.' by 'Baumgartner,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Baumgartner,

URL:

replace 'URL:' by 'T.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • T.,

1697-1714.

replace '1697-1714.' by 'Roth,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Roth,

pp.

replace 'pp.' by 'F.,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • F.,

CA.

replace 'CA.' by 'Breitfelder,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Breitfelder,

Clara,

replace 'Clara,' by 'Usenix.org/conference/usenixsecurity19/presentation/azad.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Usenix.org/conference/usenixsecurity19/presentation/azad.

Santa

replace 'Santa' by 'https://www.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • https://www.

Association,

replace 'Association,' by 'URL:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • URL:

USENIX

replace 'USENIX' by '1697-1714.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 1697-1714.

19),

replace '19),' by 'pp.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • pp.

Security

replace 'Security' by 'CA.'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • CA.

(USENIX

replace '(USENIX' by 'Clara,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Clara,

Symposium

replace 'Symposium' by 'Santa'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Santa

Security

replace 'Security' by 'Association,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Association,

insert '' by '19),'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 19),

insert '' by 'Security'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Security

insert '' by '(USENIX'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • (USENIX

28th

replace '28th' by 'Symposium'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Symposium

in:

replace 'in:' by 'Security'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Security

applications,

replace 'applications,' by 'USENIX'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • USENIX

web

replace 'web' by '28th'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • 28th

debloating

replace 'debloating' by 'in:'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • in:

of

replace 'of' by 'applications,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • applications,

benefits

replace 'benefits' by 'web'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • web

security

replace 'security' by 'debloating'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • debloating

the

replace 'the' by 'of'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • of

Quantifying

replace 'Quantifying' by 'benefits'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • benefits

more:

replace 'more:' by 'security'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • security

is

replace 'is' by 'the'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • the

Less

replace 'Less' by 'Quantifying'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • Quantifying

insert '' by 'assembly,'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • assembly,

webassembly,

replace 'webassembly,' by 'web'

Happy suggestion

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.

(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.

Suggestions

  • web

doi

This sentence does not start with an uppercase letter.

Happy suggestion

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] Arteaga, J.C., Malivitsis, O.F., Pérez, O.L.V., Baudry, B., Monperrus, M., 2021. Crow: Code diversification for webassembly, in: Proceedings of MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, B.A., Laperdrix, P., Nikiforakis, N., 2019. Less is more: Quantifying the security benefits of debloating web applications, in: 28th USENIX Security Symposium (USENIX Security 19), USENIX Association, Santa Clara, CA. pp. 1697-1714. URL: https://www. usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, F., Roth, T., Baumgartner, L., Mezini, M., 2023. Wasma: A static webassembly analysis framework for everyone, in: 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, T., Lopes, P., Santos, N., Santos, J.F., 2022. Wasmati: An efficient static vulnerability scanner for webassembly. Com-puters & Security 118, 102745. URL: https://www.sciencedirect. com/science/article/pii/S167404822001407, doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, D., Cavallaro, L., Lanzi, A., 2007. Diversified process replice for defeating memory error exploits, in: 2007 IEEE Inter-national Performance, Computing, and Communications Conference, pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, J., Donde, S., Gu, J., Floros, O., Satabin, L., Baudry, B., Monperrus, M., 2020. Superoptimization of webassembly bytecode, in: Proceedings of MoreVMs: Workshop on Modern Language Runtimes. URL: http: //arxiv.org/pdf/2002.10213, doi:10. 1145/3397537. 3397567. Cabrera Arteaga, J., Laperdrix, P., Monperrus, M., Baudry, B., 2022. Multi-variant execution at the edge, in: Proceedings of the 9th ACM Workshop on Moving Target Defense, Association for Computing Machinery, New York, NY, USA. p. 11-22. URL: https://doi.org/ 10.1145/3560828. 3564007, doi:10.1145/3560828. 3564007. Cabrera-Arteaga, J., Monperrus, M., Toady, T., Baudry, B., 2023. Webassembly diversification for malware evasion. Computers & Se-curity 131, 103296. URL: https://www. sciencedirect.com/science/ article/pii/S0167404823002067, doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, D., Kunkel, R., Nandi, C., Willsey, M., Tatlock, Z., Polikarpova, N., 2023a. Babble: Learning better abstractions with e-graphs and anti-unification. Proc. ACM Program. Lang. 7. URL: https://doi. org/10.1145/3571207, doi:10.1145/3571207. Cao, S., He, N., Guo, Y., Wang, H., 2023b. Brewasm: A general static binary rewriting framework for webassembly, in: Hermenegildo, M.V., Morales, J.F. (Eds.), Static Analysis, Springer Nature Switzerland, Cham. pp. 139-163. Cao, S., He, N., Guo, Y., Wang, H., 2023. WASMixer: Binary Obfus-cation for WebAssembly. arXiv e-prints , arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, arXiv: 2308.03123. Cleemput, J.V., Coppens, B., De Sutter, B., 2012. Compiler mitigations for time attacks on modern x86 processors. ACM Trans. Archit. Code Optim. 8. URL: https://doi.org/10.1145/2086696. 2086702, doi:10.1145/2086696. 2086702. Cohen, F.B., 1993. Operating system protection through program evolution. Computers & Security 12, 565-584. Collberg, C., Thomborson, C., Low, D., 1997. A taxonomy of obfuscating transformations. Technical Report. Department of Computer Science, The University of Auckland, New Zealand. Crane, S.J., Volckaert, S., Schuster, F., Liebchen, C., Larsen, P., Davi, L., Sadeghi, A.R., Holz, T., De Sutter, B., Franz, M., 2015. It’s a trap: Table randomization and protection against function-reuse attacks, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, New York, NY, USA. p. 243-255. URL: https://doi. org/10.1145/2810103. 2813682, doi:10.1145/2810103. 2813682.

Suggestions

  • Doi

References

replace 'References' by 'References.'

Happy suggestion

(0)References.

(0)References

Suggestions

  • References.

insert '' by 'and'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • and

doi:10.1109/SP.

delete 'doi:10.1109/SP.' by ''

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

1-19.

replace '1-19.' by 'of'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • of

pp.

replace 'pp.' by 'year'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • year

(SP),

replace '(SP),' by 'the'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • the

Privacy

replace 'Privacy' by 'is'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • is

and

replace 'and' by '2019'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2019

Security

replace 'Security' by 'doi:10.1109/SP.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • doi:10.1109/SP.

on

replace 'on' by '1-19.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 1-19.

Symposium

replace 'Symposium' by 'pp.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • pp.

IEEE

replace 'IEEE' by '(SP),'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • (SP),

2019

replace '2019' by 'Privacy'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Privacy

in:

replace 'in:' by 'and'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • and

execution,

replace 'execution,' by 'Security'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Security

speculative

replace 'speculative' by 'on'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • on

Exploiting

replace 'Exploiting' by 'Symposium'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Symposium

attacks:

replace 'attacks:' by 'IEEE'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • IEEE

Spectre

replace 'Spectre' by '2019'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2019

2019.

replace '2019.' by 'in:'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • in:

Y.,

replace 'Y.,' by 'execution,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • execution,

Yarom,

replace 'Yarom,' by 'speculative'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • speculative

M.,

replace 'M.,' by 'Exploiting'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Exploiting

Schwarz,

replace 'Schwarz,' by 'attacks:'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • attacks:

T.,

replace 'T.,' by 'Spectre'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Spectre

Prescher,

replace 'Prescher,' by '2019.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2019.

S.,

replace 'S.,' by 'Y.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Y.,

Mangard,

replace 'Mangard,' by 'Yarom,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Yarom,

Lipp,

delete 'Lipp,' by ''

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

M.,

replace 'M.,' by 'Schwarz,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Schwarz,

Hamburg,

replace 'Hamburg,' by 'T.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • T.,

W.,

replace 'W.,' by 'Prescher,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Prescher,

Haas,

replace 'Haas,' by 'M.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • M.,

D.,

replace 'D.,' by 'Lipp,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Lipp,

Gruss,

replace 'Gruss,' by 'M.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • M.,

D.,

replace 'D.,' by 'Hamburg,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Hamburg,

Genkin,

replace 'Genkin,' by 'W.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • W.,

A.,

replace 'A.,' by 'Haas,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Haas,

Fogh,

replace 'Fogh,' by 'D.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • D.,

J.,

replace 'J.,' by 'Gruss,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Gruss,

Horn,

replace 'Horn,' by 'D.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • D.,

P.,

replace 'P.,' by 'Genkin,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Genkin,

Kocher,

replace 'Kocher,' by 'A.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • A.,

2022.00077.

replace '2022.00077.' by 'Fogh,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Fogh,

1109/CLOUD55607.

replace '1109/CLOUD55607.' by 'J.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • J.,

doi:10.

replace 'doi:10.' by 'Horn,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Horn,

543-553.

replace '543-553.' by 'P.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • P.,

pp.

replace 'pp.' by 'Kocher,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Kocher,

(CLOUD),

replace '(CLOUD),' by '2022.00077.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2022.00077.

Computing

replace 'Computing' by '1109/CLOUD55607.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 1109/CLOUD55607.

Cloud

replace 'Cloud' by 'doi:10.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • doi:10.

on

replace 'on' by '543-553.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 543-553.

Conference

replace 'Conference' by 'pp.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • pp.

International

replace 'International' by '(CLOUD),'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • (CLOUD),

15th

replace '15th' by 'Computing'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Computing

IEEE

replace 'IEEE' by 'Cloud'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Cloud

2022

replace '2022' by 'on'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • on

in:

replace 'in:' by 'Conference'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Conference

solutions,

replace 'solutions,' by 'International'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • International

security

replace 'security' by '15th'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 15th

webassembly

replace 'webassembly' by 'IEEE'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • IEEE

of

replace 'of' by '2022'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2022

survey

replace 'survey' by 'in:'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • in:

assemble!

replace 'assemble!' by 'solutions,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • solutions,

Avengers,

replace 'Avengers,' by 'security'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • security

2022.

replace '2022.' by 'webassembly'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • webassembly

Y.,

replace 'Y.,' by 'of'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • of

Shin,

replace 'Shin,' by 'survey'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • survey

H.,

replace 'H.,' by 'assemble!'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • assemble!

Jang,

replace 'Jang,' by 'Avengers,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Avengers,

M.,

replace 'M.,' by '2022.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2022.

Kim,

replace 'Kim,' by 'Y.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Y.,

html.

replace 'html.' by 'Shin,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Shin,

wasm-overview.

replace 'wasm-overview.' by 'H.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • H.,

https://kotlinlang.org/docs/

replace 'https://kotlinlang.org/docs/' by 'Jang,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Jang,

=

replace '=' by 'M.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • M.,

URL:

replace 'URL:' by 'Kim,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Kim,

wasm.

replace 'wasm.' by '='

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • =

Kotlin

replace 'Kotlin' by 'URL'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • URL

2023.

replace '2023.' by 'html.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • html.

Jetbrain,

replace 'Jetbrain,' by 'wasm-overview.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • wasm-overview.

100-120.

replace '100-120.' by 'https://kotlinlang.org/docs/'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • https://kotlinlang.org/docs/

pp.

replace 'pp.' by 'wasm.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • wasm.

Springer.

replace 'Springer.' by 'Kotlin'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Kotlin

Security,

replace 'Security,' by '2023.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2023.

on

replace 'on' by 'Jetbrain,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Jetbrain,

Workshop

replace 'Workshop' by '100-120.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 100-120.

International

replace 'International' by 'pp.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • pp.

in:

replace 'in:' by 'Springer.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Springer.

protection,

replace 'protection,' by 'Security,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Security,

soft-ware

replace 'soft-ware' by 'on'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • on

for

replace 'for' by 'Workshop'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Workshop

individualization

replace 'individualization' by 'International'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • International

Peephole

replace 'Peephole' by 'in:'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • in:

superdiversifier:

replace 'superdiversifier:' by 'protection,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • protection,

The

replace 'The' by 'soft-ware'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • soft-ware

2008.

replace '2008.' by 'for'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • for

R.,

replace 'R.,' by 'individualization'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • individualization

Venkatesan,

replace 'Venkatesan,' by 'Peephole'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Peephole

C.W.N.,

replace 'C.W.N.,' by 'superdiversifier:'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • superdiversifier:

Saw,

replace 'Saw,' by 'The'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • The

P.,

replace 'P.,' by '2008.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2008.

Naldurg,

replace 'Naldurg,' by 'R.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • R.,

M.H.,

replace 'M.H.,' by 'Venkatesan,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Venkatesan,

Jakubowski,

replace 'Jakubowski,' by 'and'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • and

M.,

replace 'M.,' by 'C.W.N.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • C.W.N.,

Jacob,

replace 'Jacob,' by 'Saw,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Saw,

77-98.

replace '77-98.' by 'P.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • P.,

pp.

replace 'pp.' by 'Naldurg,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Naldurg,

Springer,

replace 'Springer,' by 'M.H.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • M.H.,

Defense.

replace 'Defense.' by 'Jakubowski,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Jakubowski,

Target

replace 'Target' by 'M.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • M.,

Moving

replace 'Moving' by 'Jacob,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Jacob,

in:

replace 'in:' by '77-98.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 77-98.

diversity,

replace 'diversity,' by 'pp.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • pp.

software

replace 'software' by 'Springer,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Springer,

Compiler-generated

replace 'Compiler-generated' by 'Defense.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Defense.

2011.

replace '2011.' by 'Target'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Target

M.,

replace 'M.,' by 'Moving'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Moving

Franz,

replace 'Franz,' by 'in:'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • in:

C.,

replace 'C.,' by 'diversity,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • diversity,

Wimmer,

replace 'Wimmer,' by 'software'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • software

S.,

replace 'S.,' by 'Compiler-generated'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Compiler-generated

Brunthaler,

replace 'Brunthaler,' by '2011.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2011.

A.,

replace 'A.,' by 'M.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • M.,

Gal,

replace 'Gal,' by 'Franz,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Franz,

G.,

replace 'G.,' by 'C.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • C.,

Wagner,

replace 'Wagner,' by 'Wimmer,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Wimmer,

K.,

replace 'K.,' by 'S.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • S.,

Manivannan,

replace 'Manivannan,' by 'Brunthaler,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Brunthaler,

insert '' by 'Gal,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Gal,

insert '' by 'G.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • G.,

Homescu,

replace 'Homescu,' by 'Wagner,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Wagner,

B.,

replace 'B.,' by 'K.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • K.,

Salamat,

replace 'Salamat,' by 'Manivannan,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Manivannan,

T.,

replace 'T.,' by 'A.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • A.,

Jackson,

replace 'Jackson,' by 'Homescu,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Homescu,

2696-2708.

replace '2696-2708.' by 'B.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • B.,

pp.

replace 'pp.' by 'Salamat,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Salamat,

2021,

replace '2021,' by 'T.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • T.,

Conference

replace 'Conference' by 'Jackson,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Jackson,

Web

replace 'Web' by '2696-2708.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2696-2708.

the

replace 'the' by 'pp.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • pp.

of

replace 'of' by '2021,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2021,

Proceedings

replace 'Proceedings' by 'Conference'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Conference

in:

replace 'in:' by 'Web'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Web

cases,

replace 'cases,' by 'the'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • the

use

replace 'use' by 'of'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • of

languages,

replace 'languages,' by 'Proceedings'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Proceedings

Security,

replace 'Security,' by 'in'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • in

binaries:

replace 'binaries:' by 'cases,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • cases,

webassembly

replace 'webassembly' by 'use'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • use

real-world

replace 'real-world' by 'languages,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • languages,

of

replace 'of' by 'Security,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Security,

study

replace 'study' by 'binaries:'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • binaries:

empirical

replace 'empirical' by 'webassembly'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • webassembly

An

replace 'An' by 'real-world'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • real-world

2021.

replace '2021.' by 'of'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • of

M.,

replace 'M.,' by 'study'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • study

Pradel,

replace 'Pradel,' by 'empirical'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • empirical

D.,

replace 'D.,' by 'An'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • An

Lehmann,

replace 'Lehmann,' by '2021.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2021.

A.,

replace 'A.,' by 'M.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • M.,

Hilbig,

replace 'Hilbig,' by 'Pradel,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Pradel,

3062363.

replace '3062363.' by 'D.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • D.,

doi:10.1145/3062341.

replace 'doi:10.1145/3062341.' by 'Lehmann,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Lehmann,

3062363,

replace '3062363,' by 'A.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • A.,

https://doi.org/10.1145/3062341.

replace 'https://doi.org/10.1145/3062341.' by 'Hilbig,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Hilbig,

URL:

replace 'URL:' by '3062363.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 3062363.

185-200.

replace '185-200.' by 'doi:10.1145/3062341.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • doi:10.1145/3062341.

p.

replace 'p.' by '3062363,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 3062363,

USA.

replace 'USA.' by 'https://doi.org/10.1145/3062341.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • https://doi.org/10.1145/3062341.

NY,

replace 'NY,' by 'URL:'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • URL:

York,

replace 'York,' by '185-200.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 185-200.

New

replace 'New' by 'p.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • p.

Machinery,

replace 'Machinery,' by 'USA.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • USA.

Computing

replace 'Computing' by 'NY,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • NY,

for

replace 'for' by 'York,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • York,

Association

replace 'Association' by 'New'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • New

Implementation,

replace 'Implementation,' by 'Machinery,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Machinery,

and

replace 'and' by 'Computing'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Computing

Design

replace 'Design' by 'for'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • for

Language

replace 'Language' by 'Association'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Association

Programming

replace 'Programming' by 'Implementation,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Implementation,

on

replace 'on' by 'and'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • and

Conference

replace 'Conference' by 'Design'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Design

SIGPLAN

replace 'SIGPLAN' by 'Language'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Language

ACM

replace 'ACM' by 'Programming'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Programming

38th

replace '38th' by 'on'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • on

the

replace 'the' by 'Conference'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Conference

of

replace 'of' by 'SIGPLAN'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • SIGPLAN

Proceedings

replace 'Proceedings' by 'ACM'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • ACM

in:

replace 'in:' by '38th'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 38th

webassembly,

replace 'webassembly,' by 'the'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • the

with

replace 'with' by 'of'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • of

speed

replace 'speed' by 'Proceedings'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Proceedings

to

replace 'to' by 'in:'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • in:

up

replace 'up' by 'assembly,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • assembly,

insert '' by 'with'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • with

insert '' by 'speed'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • speed

insert '' by 'to'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • to

the

replace 'the' by 'up'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • up

Bringing

replace 'Bringing' by 'web'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • web

2017b.

replace '2017b.' by 'the'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • the

J.,

replace 'J.,' by 'Bringing'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Bringing

Bastien,

replace 'Bastien,' by '2017b.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2017b.

A.,

replace 'A.,' by 'J.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • J.,

Zakai,

replace 'Zakai,' by 'Bastien,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Bastien,

L.,

replace 'L.,' by 'A.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • A.,

Wagner,

replace 'Wagner,' by 'Zakai,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Zakai,

D.,

replace 'D.,' by 'L.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • L.,

Gohman,

replace 'Gohman,' by 'Wagner,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Wagner,

M.,

replace 'M.,' by 'D.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • D.,

Holman,

replace 'Holman,' by 'Gohman,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Gohman,

B.L.,

replace 'B.L.,' by 'M.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • M.,

Titzer,

replace 'Titzer,' by 'Holman,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Holman,

D.L.,

replace 'D.L.,' by 'B.L.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • B.L.,

Schuff,

replace 'Schuff,' by 'Titzer,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Titzer,

A.,

replace 'A.,' by 'D.L.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • D.L.,

Rossberg,

replace 'Rossberg,' by 'Schuff,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Schuff,

Haas,

replace 'Haas,' by 'Rossberg,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Rossberg,

185-200.

replace '185-200.' by 'A.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • A.,

pp.

replace 'pp.' by 'Haas,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Haas,

Implementation,

replace 'Implementation,' by '185-200.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 185-200.

and

replace 'and' by 'pp.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • pp.

Design

replace 'Design' by 'Implementation,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Implementation,

Language

replace 'Language' by 'and'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • and

Programming

replace 'Programming' by 'Design'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Design

on

replace 'on' by 'Language'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Language

Conference

replace 'Conference' by 'Programming'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Programming

SIGPLAN

replace 'SIGPLAN' by 'on'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • on

ACM

replace 'ACM' by 'Conference'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Conference

38th

replace '38th' by 'SIGPLAN'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • SIGPLAN

the

replace 'the' by 'ACM'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • ACM

of

replace 'of' by '38th'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 38th

Proceedings

replace 'Proceedings' by 'the'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • the

in:

replace 'in:' by 'of'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • of

WebAssembly,

replace 'WebAssembly,' by 'Proceedings'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Proceedings

with

replace 'with' by 'in:'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • in:

speed

replace 'speed' by 'WebAssembly,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • WebAssembly,

to

replace 'to' by 'with'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • with

up

replace 'up' by 'speed'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • speed

web

replace 'web' by 'to'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • to

the

replace 'the' by 'up'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • up

2017a.

replace '2017a.' by 'the'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • the

Bastien,

replace 'Bastien,' by '2017a.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • 2017a.

L.,

replace 'L.,' by 'A.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • A.,

https://github.com/PLSysSec/safeside.

replace 'https://github.com/PLSysSec/safeside.' by 'A.,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • A.,

URL:

replace 'URL:' by 'Haas,'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Haas,

insert '' by 'https://github.com/PLSysSec/safeside.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • https://github.com/PLSysSec/safeside.

in:

replace 'in:' by 'in'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • in

fastly.com/blog/

replace 'fastly.com/blog/' by 'Fastly.com/blog/'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Fastly.com/blog/

fastly.com/blog/the-power-of-serverless-at-the-edge.

replace 'fastly.com/blog/the-power-of-serverless-at-the-edge.' by 'Fastly.com/blog/the-power-of-serverless-at-the-edge.'

Happy suggestion

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.

(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.

Suggestions

  • Fastly.com/blog/the-power-of-serverless-at-the-edge.

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)24 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)24 (5)of (6)25

Suggestions

  • 25.

H.,

replace 'H.,' by 'and'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • and

Zwaan,

replace 'Zwaan,' by 'H.,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • H.,

A.,

replace 'A.,' by 'Zwaan,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • Zwaan,

Nezhad,

replace 'Nezhad,' by 'A.,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • A.,

Soldani

replace 'Soldani' by 'Nezhad,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • Nezhad,

A.,

replace 'A.,' by 'Soldani'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • Soldani

Marino,

replace 'Marino,' by 'A.,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • A.,

M.,

replace 'M.,' by 'Marino,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • Marino,

Mayer,

replace 'Mayer,' by 'M.,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • M.,

L.,

replace 'L.,' by 'Mayer,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • Mayer,

Wagner,

replace 'Wagner,' by 'L.,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • L.,

1480915.

replace '1480915.' by 'Wagner,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • Wagner,

doi:10.1145/1480881.

replace 'doi:10.1145/1480881.' by '1480915.'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • 1480915.

1480915,

replace '1480915,' by 'doi:10.1145/1480881.'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • doi:10.1145/1480881.

1480881.

replace '1480881.' by '1480915,'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • 1480915,

https://doi.org/10.1145/

replace 'https://doi.org/10.1145/' by 'https://doi.org/10.1145/1480881.'

Happy suggestion

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.

(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.

Suggestions

  • https://doi.org/10.1145/1480881.

doi

This sentence does not start with an uppercase letter.

Happy suggestion

[46] [47] [48] [49] [50] Tate, R., Stepp, M., Tatlock, Z., Lerner, S., 2009. Equality saturation: A new approach to optimization, in: Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Association for Computing Machinery, New York, NY, USA. p. 264-276. URL: https://doi.org/10.1145/ 1480881. 1480915, doi:10.1145/1480881. 1480915. Wagner, L., Mayer, M., Marino, A., Soldani Nezhad, A., Zwaan, H., Malavolta, I., 2023. On the energy consumption and performance of webassembly binaries across programming languages and runtimes in iot, in: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, Association for Computing Machinery, New York, NY, USA. p. 72-82. URL: https://doi.org/10.1145/3593434. 3593454, doi:10.1145/3593434. 3593454. Wang, J., Chen, B., Wei, L., Liu, Y., 2017. Skyfire: Data-driven seed generation for fuzzing, in: 2017 IEEE Symposium on Security and Privacy (SP), pp. 579-594. doi:10.1109/SP. 2017.23. Wen, E., Dietrich, J., 2023. Wasmslim: Optimizing webassembly binary distribution via automatic module splitting, in: 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, M., Nandi, C., Wang, Y.R., Flatt, O., Tatlock, Z., Panchekha, P., 2021. Egg: Fast and extensible equality saturation. Proc. ACM Program. Lang. 5. URL: https://doi.org/10.1145/3434304, doi:10. 1145/3434304.

Suggestions

  • Doi

267.

delete '267.' by ''

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

247—

replace '247—' by '247—267.'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • 247—267.

javascript,

replace 'javascript,' by 'Javascript,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • Javascript,

arXiv

replace 'arXiv' by 'ArXiv'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • ArXiv

https://doi.

replace 'https://doi.' by 'https://doi.org.'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • https://doi.org.

An

replace 'An' by 'an'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • an

in:

replace 'in:' by 'in'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • in

usenix.

replace 'usenix.' by 'Usenix.'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • Usenix.

in:

replace 'in:' by 'in'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • in

V.J.,

delete 'V.J.,' by ''

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

Reddi,

replace 'Reddi,' by 'and'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • and

S.,

replace 'S.,' by 'V.J.,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • V.J.,

Wallace,

replace 'Wallace,' by 'Reddi,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • Reddi,

G.,

replace 'G.,' by 'S.,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • S.,

Lowney,

replace 'Lowney,' by 'Wallace,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • Wallace,

A.,

replace 'A.,' by 'G.,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • G.,

Klauser,

replace 'Klauser,' by 'Lowney,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • Lowney,

H.,

replace 'H.,' by 'A.,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • A.,

Patil,

replace 'Patil,' by 'Klauser,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • Klauser,

R.,

replace 'R.,' by 'H.,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • H.,

Muth,

replace 'Muth,' by 'Patil,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • Patil,

insert '' by 'Muth,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • Muth,

insert '' by 'R.,'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • R.,

arXiv

replace 'arXiv' by 'ArXiv'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • ArXiv

https://doi.

replace 'https://doi.' by 'https://doi.org.'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • https://doi.org.

in:

replace 'in:' by 'in'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • in

dynami-cally

replace 'dynami-cally' by 'dynamically'

Happy suggestion

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.

(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.

Suggestions

  • dynamically

25

replace '25' by '25.'

Happy suggestion

(0)Cabrera-Arteaga (1)et (2)al. Page (3)25 (4)of (5)25.

(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)25 (5)of (6)25

Suggestions

  • 25.